ML16272A216: Difference between revisions

From kanterella
Jump to navigation Jump to search
(Created page by program invented by StriderTol)
(Created page by program invented by StriderTol)
 
(4 intermediate revisions by the same user not shown)
Line 3: Line 3:
| issue date = 04/30/2014
| issue date = 04/30/2014
| title = Validation of Hrr Breach Hydrograph for Jocassee Dam, Dated April 30, 2014 (Redacted)
| title = Validation of Hrr Breach Hydrograph for Jocassee Dam, Dated April 30, 2014 (Redacted)
| author name = Ehasz J L
| author name = Ehasz J
| author affiliation = URS Corp
| author affiliation = URS Corp
| addressee name =  
| addressee name =  
Line 17: Line 17:


=Text=
=Text=
{{#Wiki_filter:Enclosure I ML14139A175
{{#Wiki_filter:Enclosure I
* lthkkh.Id ,fr,,m i,lkl. 4(
* lthkkh.Id ,fr,,m i,lkl. 'sjIjl,*iru, 'n*Iv 4( .*ID0",QIrl ML14139A175 Enclosure 1 Validation of HRR Breach Hydrograph for Jocassee Dam by Joseph L. Ehasz, P.E. and Dr. David S., Bowles, P.E.,
Enclosure 1 Validation of HRR Breach Hydro graph for Jocassee Dam by Joseph L. Ehasz, P.E. and Dr. David S., Bowles, P.E., April 2014 Wg VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM (Through an In-Depth Review of the Xu and Z[hang Breach Parameter Estimation Methodology)
April 2014
April 2014 By Joseph 1. Ehasz, P.E.Dr. David S. Bowles, P.E.~~~~~~1~~
-. A -------------
TL1--------
URS In assodiation with VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM A"Jr" ............. VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM (THROUGH AN IN-DEPTH REVIEW OF THE XU AND ZHANG BREACH PARAMETER ESTIMATION METHODOLOGY)
APRIL 2014 BY APRIL 30, 2014 JOSEPH L. EHASZ, P.E.URS CIVIL CONSTRUCTION
& MINING, INC.DR. DAVID.S. BOWLES, P.E.RAC ENGINEERS AND ECONOMISTS, LLC APRIL 30,A201 PAGE I


oerurn~y ,nrormuuon -wIUmnoIU rrom puo~uC asciosure per 1u L1-I 2,390(c1)VALIDATION OF HRR BREACH H VDROGRAPH FOR JOCASSEE DAM TABLE OF CONTENTS SECTION PAGE 1.0 OBJECTIVE
Wg
.....................................................................................................
                                                  ~~~~~~1~~
1 1.1 Authorization
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM (Through an In-Depth Review of the Xu and Z[hang Breach Parameter Estimation Methodology)
..................................................................................................
April 2014 By Joseph 1. Ehasz, P.E.
1 1.2 Objective of the Validation Report............................................................................
Dr. David S. Bowles, P.E.
1


==2.0 INTRODUCTION==
      -.         A -------------          TL1--------
                                                                              "Jr" .............      DAMt*J FOR JOCASSEE l*AL(
URS          Inassodiation with VALIDATION OF HRR BREACH HYDROGRAPH VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM A
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM (THROUGH AN IN-DEPTH REVIEW OF THE XU AND ZHANG BREACH PARAMETER ESTIMATION METHODOLOGY)
APRIL 2014 BY APRIL 30, 2014 JOSEPH L. EHASZ, P.E.
URS CIVIL CONSTRUCTION & MINING, INC.
DR. DAVID.S. BOWLES, P.E.
RAC ENGINEERS AND ECONOMISTS, LLC                                      30,A201 APRIL PAGE I


................................................................................................
i,uynapgp*  oerurn~y .*n:*iuve ,nrormuuon -wIUmnoIU rrom puo~uC asciosure per 1u L1-I 2,390(c1)
2 2.1 HRR (Duke 2013) Breach Hydrograph
VALIDATION OF HRR BREACH H VDROGRAPH FOR JOCASSEE DAM TABLE OF CONTENTS SECTION                                                                                                                PAGE 1.0    OBJECTIVE.....................................................................................................       1 1.1  Authorization .................................................................................................. 1 1.2   Objective of the Validation Report............................................................................ 1
.......................................................................
2 2.2 Agency Questions
............................................................................................
3 2.3 Summary of Approach for This Review ......................................................................
4 2.4 Report Ouline ................................................................................................
5


==3.0 BACKGROUND==
==2.0     INTRODUCTION==
................................................................................................ 2 2.1    HRR (Duke 2013) Breach Hydrograph .......................................................................        2 2.2    Agency Questions ............................................................................................      3 2.3    Summary of Approach for This Review ......................................................................        4 2.4    Report Ouline ................................................................................................ 5


.................................................................................................
==3.0    BACKGROUND==
7 3.1 Characterization of Jocassee Dam ...........................................................................
................................................................................................. 7 3.1   Characterization of Jocassee Dam ........................................................................... 7 3.2   Piping Failure Mechanism .................................................................................... 9 3.3   Potential Piping Failure Modes for Jocassee Dam.......................................................... 10 4.0     CONFIRMATION OF JOCASSEE DAM ERODIBILITY....................................................... 11 4.1     Overview..................................................................................................... 11 4.2     Use of Briaud's Erosion Categorization Scheme by Xu and Zhang (2009)................................. 11 4.3     Confirmation of Low Erosion Category for Jocassee Dam.................................................. 13 5.0     ORIGINAL XU AND ZHANG REGRESSION EQUAlIONS................................................... 15 6.0     REVIEW AND REVISION OF XU AND ZHANG REGRESSION EQUATIONS............................... 16 6.1   Approach to Review and Revision .......................................................................... 16 6.2   Summary of Review Findings................................................................................ 17 6.3   Summary of Revisions to Case History Data Set........................................................... 24 6.4   Revised Regression Equations for use inthe Sensitivity Study ......................................... ,.,.26 6.5   Application to Teton Dam Failure ........................................................................... 28 1.0     REVISED XU AND ZHANG REGRESSION EQUATIONS SENSITIVITY STUDIES .........................                           32 7.1   Overview of Approach.......................................................................................     32 7.2   Revised Xu and Zhang Breach Parameter Estimates for Jocassee Dam ..................................             32 7.3   Example of Inconsistencies between Peak Breach Flow and Breach Development Time .................               40 7.4   Discussion of HEC-RAS Results..... .......................................................................     41
7 3.2 Piping Failure Mechanism  
....................................................................................
9 3.3 Potential Piping Failure Modes for Jocassee Dam..........................................................
10 4.0 CONFIRMATION OF JOCASSEE DAM ERODIBILITY.......................................................
11 4.1 Overview.....................................................................................................
11 4.2 Use of Briaud's Erosion Categorization Scheme by Xu and Zhang (2009).................................
11 4.3 Confirmation of Low Erosion Category for Jocassee Dam..................................................
13 5.0 ORIGINAL XU AND ZHANG REGRESSION EQUAlIONS...................................................
15 6.0 REVIEW AND REVISION OF XU AND ZHANG REGRESSION EQUATIONS...............................
16 6.1 Approach to Review and Revision ..........................................................................
16 6.2 Summary of Review Findings................................................................................
17 6.3 Summary of Revisions to Case History Data Set...........................................................
24 6.4 Revised Regression Equations for use in the Sensitivity Study .........................................
,.,.26 6.5 Application to Teton Dam Failure ...........................................................................
28 1.0 REVISED XU AND ZHANG REGRESSION EQUATIONS SENSITIVITY STUDIES .........................
32 7.1 Overview of Approach.......................................................................................
32 7.2 Revised Xu and Zhang Breach Parameter Estimates for Jocassee Dam ..................................
32 7.3 Example of Inconsistencies between Peak Breach Flow and Breach Development Time .................
40 7.4 Discussion of HEC-RAS Results.....  
.......................................................................
41  


==8.0 CONCLUSION==
==8.0     CONCLUSION==
S  
S ...............................................................................................       45 8.1   Discuss Overall Conclusion ................................................................................. 45 8.2   Concluding Responses to Agency Questions............................................................... 45 8.3   Concluding Support for the HRR Breach Hydrograph ...................................................... 46
...............................................................................................
45 8.1 Discuss Overall Conclusion  
.................................................................................
45 8.2 Concluding Responses to Agency Questions...............................................................
45 8.3 Concluding Support for the HRR Breach Hydrograph  
......................................................
46  


==9.0 REFERENCES==
==9.0     REFERENCES==
.................................................................................................
................................................................................................. 50 PA GE ii
50 PA GE ii s.,onrans minrirwuun [lEE pua; uo ,uou r x I.r 3 83, VALIDA TION OF HRR BREACH HYDROGRAPH FOR JOCASSEE, DAM.p_APPENDICES Appendix A- B riaud's Report Appendix B -Original Xu and Zhang Regression Equations and HRR Hydrograph.
Appendix C -Bench Marking / Comparative Analysis 0. 1 -Benchmarking Rockfill Dams and Failures 0.2- Embankment Design Appendix D -Detailed Data Supporting Xu and Zhang Revisions Appendix E -Mark Morris Review Report P A GE iii VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 1.0 OBJECTIVE 1.1 Authorization The authorization for this review was attached in an e-mail dated June 20, 2013 from Mr. Dean Hubbard, Duke Energy, to Mr. Joseph Ehasz, URS, Civil Construction
& Mining 1.2 Objective of the Validation Report The objective of this report is to respond to questions raised by the FERC and the NRC about the use of the Xu and Zhang (2009) regression equations for estimating breach parameters to develop the breach hydrograph for a deterministic sunny-day breach of the Jocassee Dam. The agency questions are presented in Section 2.2. The implications of these responses and a detailed review of the Xu and Zhang (2009) methodology provide support for the breach hydrograph submitted to the NR C by Duke (2013) in the Hydrologic Reevaluation Report (HRR).PAGE 1 VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM


==2.0 INTRODUCTION==
s.,onrans *ecurnzy *enssuve minrirwuun ';*i#~                [lEE pua; uo      ,uou  ;*,
r    x I.r3 83, VALIDA TION OF HRR BREACH HYDROGRAPH FOR JOCASSEE, DAM
                              .                                                                          p
_APPENDICES Appendix A- Briaud's Report Appendix B- Original Xu and Zhang Regression Equations and HRR Hydrograph.
Appendix C- Bench Marking / Comparative Analysis 0.1 - Benchmarking Rockfill Dams and Failures 0.2- Embankment Design Appendix D- Detailed Data Supporting Xu and Zhang Revisions Appendix E- Mark Morris Review Report P A GE iii


2.1 HRR (Duke 2013) Breach Hydrograph The HRR breach hydrographs (DUKe 2013) for a deterministic
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 1.0  OBJECTIVE 1.1     Authorization The authorization for this review was attached in an e-mail dated June 20, 2013 from Mr. Dean Hubbard, Duke Energy, to Mr. Joseph Ehasz, URS, Civil Construction & Mining 1.2     Objective of the Validation Report The objective of this report is to respond to questions raised by the FERC and the NRC about the use of the Xu and Zhang (2009) regression equations for estimating breach parameters to develop the breach hydrograph for a deterministic sunny-day breach of the Jocassee Dam. The agency questions are presented in Section 2.2. The implications of these responses and a detailed review of the Xu and Zhang (2009) methodology provide support for the breach hydrograph submitted to the NR C by Duke (2013) in the Hydrologic Reevaluation Report (HRR).
:sunny-day breach of the Jocassee Dam were developed as follows:*The predicted median breach dimensions obtained from the Xu and Zhang (2009) best exact regression equations for a low erosion category were input to the HEC-RAS model.*The values of the orifice and weir" coefficients and the breach progression relationship in HEC-RAS were iteratively changed within reasonable ranges of values to match the predicted peak breach flow rate and the failure time from Xu and Zhang (2009).Consistent with the definition of failure time by Xu and Zhang (2009), the predicted value of failure time was used in HEC-RAS as a combination of breach initiation and breach formation.
PAGE 1
An independent review, entitled "Jocassee and Keowee Dams Breach Parameter Review", dated February 2013, was performed on the Jocassee Dam postulated breach parameter estimates and underlying assumptions by Joseph L. Ehasz and Dr. David S. Bowles (Ehasz and Bowles 2013). That review focused on the appropriateness of estimating potenti~al piping breach parameters for the Jocassee Dam based on the rXu and Zhang (2009) regression equations.
Duke Energy and its consultant HDR Engineering had selected the dam breach parameter estimation methodology proposed by Y. Xu and L. M. Zhang in their technical paper entitled "Breaching Parameters for Earth and Rockfill Dams" published in the American Society of Civil Engineers (ASCE) Journal of Geotechnical and Geoenvironmental Engineering in December 2009 and in Xu (2010). This is a "state of knowledge" paper and is specifically applicable for consideration of a piping breach in a zoned embankment dam. The .main objective of the paper is to develop robUst empirical formulas for estimating dam breach'parameters that consider ph~ysical characteristics of the dam such as the erodibility of the embankment materials in addition to the dam height and reservoir volume, which most other regression methods rely on.The physical features of embankment dam design and construction Strongly influence both the.likelihood of a piping dam breach occurring and the breach characteristics in the event that a breach occurs. Therefore, our February 2013 report (Ehasz and Bowles 2013) began with a summary of some important physical features of the Jocassee Dam. It continued with an evaluation of, if piping should initiate, would detection.
and Successful intervention be likely to prevent a failure. It discussed what piping failure modes might apply to Jocassee Dam based on a potential failure modes analysis and some general breach parameter PAGE 2  
~J S In association with lAhC VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Finally, it evaluated, using the "state of knowledge," what are the appropriate breach param eters for Jocassee Dam? Those parameters were then used by HDR to simulate the downstream conditions that mi;ght result from a breach of Jocassee Dam caused by a piping failure.The basis of the breach parameters that were used to represent the Jocassee Dam for a piping breach and the resulting breach hydrograph were developed based on the breach parameter estimation methodology developed by Xu and Zhang (2009). Significant factors in selecting the Xu and Zhang (2009) methodology
'included its distinction between modes of failure, namely either overtopping or piping, and its consideration of the erodibility of the embankment materials.
In fact, erodibility was found to be the most significant control variable in the Xu and Zhang (2009) regression equations for all five breach parameters.
The conclusions from our February 2013 (Ehasz and Bowles 2013) review of 'the basiS for the HRR breach hydrograph (Duke 201.3) are sum marized as follows: ,Xu and Zhang (2009) is considered to be a "state-of-the~practice" regression method for estimating .piping dam breach parameters.
Unlike most other methods,, it includes erodibiiity as .a control variable.
This. variable was found to be the most .important variable in. the Xu and Zhang (2009) regression analysis.
The capability to consider erodibility is particularly important for predicting breach parameters for Jocassee Dam to account for the influence of its modern dense rockfill construction.
*The HRR (Duke 2013) breach hydrograph is .a realistic but conservative breach hydrograph that, has good defendablity based on the validity of the Xu and Zhanig (2009)method and the conservative nature of the median br~each parameter estimates due to: o uni-directional breach formation due a postulated piping failure mode initiating in the o the deposition of eroded rockflll immediately below the dam leading to a tailwater rise that would limit the rate of breach development:
and o the robust characteristics of a modern zoned central core rockfill dam that were included in the design and construction of Jocassee Dam that make it more erosion resistant than other low erodibility dams in the Xu and Zhang (2009) case histories data set on which their regression analysis is based.2.2 Agency Questions'PresentationS of the estimated Jocassee Dam breach parameters and simulated downstream conditions were made to both the FERC and the NRC based on the review presented in our February 2013 report (Ehasz and Bowles 2013). In ,addition,.
a field trip was made to the Jocassee Dam site by representatives of both regulatory agencies to visually inspect, the condition of the dam as-well as the monitoring procedures .and resulting observations.
PAGE 3 5------- -----U-, BpVlll rIFVl #V J VAUDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Both the FERC and the NRC had questions about the use of the Xu and Zhang (2009)methodology fordeveloping the breach parameter estimates.
These questions are summarized as follows: 1) Precedence
-where has use of the Xu and Zha ng (2009) methodology been accepted?2) Chinese case histories
-about 43% of the dam failure case histories on which the Xu and Zhang (2009) methodology is based are Chinese dams for which little information is available in the US.3) Representation of icase histories for rockfill and other low erodibility dams -the data set of dams used by Xu and Zhang (2009) to develop ,the regression equations has only three dams that are considered large (iLe. > 15 meters high) embankment dams with low erodibility and these darms are all outside of the US., 4) Use of the Briaud erosion categories
-how were the erosion categories developed by Briaud (2008) applied in develOping the Xu and Zhang (2009) methodology and are they applicable to dam breach?5) Breach time definition 1 -the definition of time to failure used by XU and Zhang (2009)includes at least part of the breach initiation phase in addition to the breach formation process unlike other regression methods that include only the breach formation process.Therefore the objective of this report is to respond to these agency questions and to provide support for the appropriate use of the Xu and Zhang (2009) methodology for Jocassee Dam in developing the HRR breach hydrograph submitted to the NRC by Duke. (201 3).2.3 Summary of Approach for This Review The- major activities conducted under this review were as follows:*A four-day working session was held with Dr. Yao Xur, the principal author of the Xu and Zhang (2009) methodology.
Professor Jean-Louis Briaud, the author of the erosion categorization methodology used by Xu and Zhang (2009) participated in the first two days. Dr. Xu responded to the agencY questions, and participated in a detailed case-by-case review of the 75 case histories that were used to develop the Xu and Zhang (20,09)regression equations.
* Professor Briaud made a site visit to Jocassee Dam to become familiar with the properties of the rockfill materialr and other aspects of its cOnstruction.
He addressed questions ,regarding the appropriateness of using his erosion categorization methodology in the Xu and Zhang (2009) breach parameter methodology.
He also confirmed the low erosion category for Jocassee Dam.'-in this report-the terms breach development time, and breach formation time are used interchangeably.
PAGE 4 IJSIn association with VALIDATION OF HRR BRF.ACH HYDROGRAPH FOR JOCA SSEE DAM p Revised regression equations were developed by Dr. Xu for sensitivity studies on the Jocassee Dam HRR breach hydrograph based on changes that were made to the original Xu and Zhang (2009) case histories data set to address the agency questions and some other issues identified during our detailed review. The revised equations were also applied to Teton Dam to compare with the observed breach parameters and those obtained by Xu and Zhang (2009) an d the observed breach parameters.
*Sensitivity studies were conducted based on the revised Xu and Zhang and the Froehlich (1995a and 2008) regression equations applied to Jocassee Dam. The resulting breach parameter estimates were used by HDR in the HEC-RAS model to obtain breach hydrographs .for a deterministic sunny-day breach of the Jocassee Dam.A comparison of these hydrographs with the HRR breach hydrograph submitted to the NRC by Duke (2013) provided support for the HRR breach hydrograph.


===2.4 Report===
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM
Outline* Section 3 of this rePOrt contains an update of the background discussion of Jocassee Dam that was provided in our February 2013 report (Ehasz and Bowles 2013).* Section 4 presents the outcomes of Professor Briaud's visit to Jocassee Dam his confirmation of the low erosion category for the rockfill material for this dam.* Section 5 refers to a summary of the original Xu and Zhang. (2009) methodology and its original implementation for Jocassee Dam contained in Appendix B.* Section 6 presents the findings of the review of the original Xu and Zhang (2009)methodology that we conducted with Dr. Xu, including the changes made to the case histories data set to address the FERC and NRC questions and the development of revised regression equations.
* Section 7 presents the sensitivity study using the revised regression equations for Jocassee Dam, which .prOvides support for the breach hydrographs submitted in the Hydrologic Reevaluation Report (HRR) to the NRC by Duke on March, 12, 201i3 (Duke 2013).* Section 8 presents the overall conclusions and responds to the questions presented by the FERO and NRC.* Appendix A contains Professor Briaud's complete report.* Appendix B. summarizes the original Xu and Zhang (2009) methOdology and its original implementation for Jocassee Dam on which the HRR hydrograph (Duke 2013) is based.* Appendix C contains a bench marking/comparative analysis for rockfiUl dams and characteristics of recent failures relative to Jocass ee Dam.* Appendix D contains the detailed data supporting the revision to the Xu and Zhang regression equations.
PAGE 5 TI "R In association with C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Appendix E contains a review of this report ,by Dr. Mark Morris, an internationally recognized European expert in dam breach analysis and breach hydrograph development.
The most significant outcome and conclusions of this report are the verification and revision of the data set utilized to develop the breach parameter regression equations presented in the Xu and Zhang (2009) and the verification of the interpretation of the erosion characteristics on which the Xu and Zhang (2009) methodology is based. Through sensitivity analyses based on the revised Xu and Zhang regression equations and the Froehlich (1995a and 2008) regression equations it is demonstrated that the HRR .breach hydrograph (Duke.2013) for a deterministic sunny-day piping breach of the Jocassee Dam is a reasonable and contservative estimate.PAGE 6,
~1MIENprn
~in.A5I 58W ~mIW85VW 5155121 UIIEII.MI
-WWIIRIINU.MI.Z 11(2115 £51R82158.
LumqU3ala, W 5(2 I..r~ £..I~m CII....... dV.............................. ............... .............
i,,.-7 VAUDA 170ff Of HRR BREACH HYRGRP FOR JOCASSEE DAM  


==3.0 BACKGROUND==
==2.0     INTRODUCTION==


Our February 2013 (Ehasz and Bowles 2013) report gave some details of the Jocassee Dam embankment, the general piping failure mechanism and the potential piping failure modes for the dam. As background and for continuity, this report will repeat some of this information in this section, especially with regard to the characterization of the dam and it's attributes as they affect erodibility during development of a postulated breach.3.1 Characterization of Jocassee Dam The following statements describe the detailed characteristics of the dam and are significant to dam performance and breach characteristics (see Figures 3.1 and 3.2):* The dam was completed in 1967. It has been continuously monitored and has performed very well to the present; meeting or exceeding FERO standards.
2.1 HRR (Duke 2013) Breach Hydrograph The HRR breach hydrographs (DUKe 2013) for a deterministic :sunny-day breach of the Jocassee Dam were developed as follows:
Even though the dam was designed and constructed in the mld-1960's it has all the modem and defensive measures of the rockfill dams designed and constructed today. A detailed review of the Jocassee Dam and it's performance was conducted 20 years after completio as described in the report entitled, "Jocassee Main Dam Design, Construction and Performance", by George F. Sowers, April 1987.Figure 3.1. Google aerial view of Jocassee Dam PAGE 7  
      *The predicted median breach dimensions obtained from the Xu and Zhang (2009) best exact regression equations for a low erosion category were input to the HEC-RAS model.
..... .f.. ... .. ..i'L ......1 j F E' S Q.% .1 -, In association with R .I LC ff -- 7rE VALIDATION OF HRR BREACH H'YDROGRAPH FOR JOCA$$EE DAM U (b)(7)(F)~~JOCASf.;E PAM s~cri0N Figure 3.2. Jocassee Dam cross section (Sowers 1987)Security sensitive Information.
      *The values of the orifice and weir"coefficients and the breach progression relationship in HEC-RAS were iteratively changed within reasonable ranges of values to match the predicted peak breach flow rate and the failure time from Xu and Zhang (2009).
Withhold from public disclosure under 10 CFR 2.390 (d)( 1)Beginning at the rock foundation levelI,(b)(l)F)
Consistent with the definition of failure time by Xu and Zhang (2009), the predicted value of failure time was used in HEC-RAS as a combination of breach initiation and breach formation.
I 0 (b)(7)(F)v r i To decrease the hydraulic as low as possible (b)(7)(F)v PAGE 8.l along the foundation contact.To protect the core materials from internal erosion, material movement and potential piping of the core, I(b)(7)(F)(b)(7)(F)linto the larger rockfill materials.
An independent review, entitled "Jocassee and Keowee Dams Breach Parameter Review",
PAGES I':z.. *.sz.. -.:..:..  
dated February 2013, was performed on the Jocassee Dam postulated breach parameter estimates and underlying assumptions by Joseph L. Ehasz and Dr. David S. Bowles (Ehasz and Bowles 2013). That review focused on the appropriateness of estimating potenti~al piping breach parameters for the Jocassee Dam based on the rXu and Zhang (2009) regression equations. Duke Energy and its consultant HDR Engineering had selected the dam breach parameter estimation methodology proposed by Y. Xu and L. M. Zhang in their technical paper entitled "Breaching Parameters for Earth and Rockfill Dams" published in the American Society of Civil Engineers (ASCE) Journal of Geotechnical and Geoenvironmental Engineering in December 2009 and in Xu (2010). This is a "state of knowledge" paper and is specifically applicable for consideration of a piping breach in a zoned embankment dam. The .main objective of the paper is to develop robUst empirical formulas for estimating dam breach' parameters that consider ph~ysical characteristics of the dam such as the erodibility of the embankment materials in addition to the dam height and reservoir volume, which most other regression methods rely on.
--- ;iI.2 ..ll~l .Sm.l Ua,.~pgjLajr-i a Uaw --U L-r" -.. .......KJDgS Insocaonwt1A C* VALIDATION OF HRR BREACH HYVDROGRA PH FOR JOCASSEE DAM Quality Control: selection of materials and documentation was enforced by the Resident Engineering staff and maintained as an. important function during .the construction.'
The physical features of embankment dam design and construction Strongly influence both the.
As indicated above, the selection and placement of the various Zones was carefully done so as 'to maintain 'the' compatibility'of adjacent materials-to eliminate migration of materials and maintain a stable embankment.
likelihood of a piping dam breach occurring and the breach characteristics in the event that a breach occurs. Therefore, our February 2013 report (Ehasz and Bowles 2013) began with a summary of some important physical features of the Jocassee Dam. It continued with an evaluation of, if piping should initiate, would detection. and Successful intervention be likely to prevent a failure. It discussed what piping failure modes might apply to Jocassee Dam based on a potential failure modes analysis and some general breach parameter *considerations.
Grain-size and density testing .to verify selection of soil. and rockfill materials properties and' compaction were condUcted .at intervals tO confirm and maintain control of the placements.
PAGE 2
Field inspection was maintained during construction with Duke Engineering staff observing and. interfacing to ensure the intent was maintained throughout construction.
 
~J        S    In association with lAhC
                                      *,*e.=*u*  VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Finally, it evaluated, using the "state of knowledge," what are the appropriate breach param eters for Jocassee Dam? Those parameters were then used by HDR to simulate the downstream conditions that mi;ght result from a breach of Jocassee Dam caused by a piping failure.
The basis of the breach parameters that were used to represent the Jocassee Dam for a piping breach and the resulting breach hydrograph were developed based on the breach parameter estimation methodology developed by Xu and Zhang (2009). Significant factors in selecting the Xu and Zhang (2009) methodology 'included its distinction between modes of failure, namely either overtopping or piping, and its consideration of the erodibility of the embankment materials. In fact, erodibility was found to be the most significant control variable in the Xu and Zhang (2009) regression equations for all five breach parameters.
The conclusions from our February 2013 (Ehasz and Bowles 2013) review of 'the basiS for the HRR breach hydrograph (Duke 201.3) are sum marized as follows:
      ,Xu and Zhang (2009) is considered to be a "state-of-the~practice" regression method for estimating .piping dam breach parameters. Unlike most other methods,, it includes erodibiiity as .a control variable. This. variable was found to be the most .important variable in. the Xu and Zhang (2009) regression analysis. The capability to consider erodibility is particularly important for predicting breach parameters for Jocassee Dam to account for the influence of its modern dense rockfill construction.
      *The HRR (Duke 2013) breach hydrograph is .a realistic but conservative breach hydrograph that, has good defendablity based on the validity of the Xu and Zhanig (2009) method and the conservative nature of the median br~each parameter estimates due to:
o uni-directional breach formation due a postulated piping failure mode initiating in the Ib()*
o the deposition of eroded rockflll immediately below the dam leading to a tailwater rise that would limit the rate of breach development: and o the robust characteristics of a modern zoned central core rockfill dam that were included in the design and construction of Jocassee Dam that make it more erosion resistant than other low erodibility dams in the Xu and Zhang (2009) case histories data set on which their regression analysis is based.
2.2    Agency Questions
'PresentationS of the estimated Jocassee Dam breach parameters and simulated downstream conditions were made to both the FERC and the NRC based on the review presented in our February 2013 report (Ehasz and Bowles 2013). In ,addition,. a field trip was made to the Jocassee Dam site by representatives of both regulatory agencies to visually inspect, the condition of the dam as-well as the monitoring procedures .and resulting observations.
PAGE 3
 
                                                                                                        ----- U-,
BpVlll 5-------
J*P*ImV  *eVVeV*IV    rIFVl #V J              VAUDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Both the FERC and the NRC had questions about the use of the Xu and Zhang (2009) methodology fordeveloping the breach parameter estimates. These questions are summarized as follows:
: 1) Precedence - where has use of the Xu and Zha ng (2009) methodology been accepted?
: 2) Chinese case histories - about 43% of the dam failure case histories on which the Xu and Zhang (2009) methodology is based are *for Chinese dams for which little information is available in the US.
: 3) Representation of icase histories for rockfill and other low erodibility dams - the data set of dams used by Xu and Zhang (2009) to develop ,the regression equations has only three dams that are considered large (iLe. > 15 meters high) embankment dams with low erodibility and these darms are all outside of the US.,
: 4) Use of the Briaud erosion categories              - how were the erosion categories developed by Briaud (2008) applied in develOping the Xu and Zhang (2009) methodology and are they applicable to dam breach?
: 5) Breach time definition 1 - the definition of time to failure used by XU and Zhang (2009) includes at least part of the breach initiation phase in addition to the breach formation process unlike other regression methods that include only the breach formation process.
Therefore the objective of this report is to respond to these agency questions and to provide support for the appropriate use of the Xu and Zhang (2009) methodology for Jocassee Dam in developing the HRR breach hydrograph submitted to the NRC by Duke. (201 3).
2.3        Summary of Approach for This Review The- major activities conducted under this review were as follows:
        *A four-day working session was held with Dr. Yao Xur, the principal author of the Xu and Zhang (2009) methodology. Professor Jean-Louis Briaud, the author of the erosion categorization methodology used by Xu and Zhang (2009) participated in the first two days. Dr. Xu responded to the agencY questions, and participated in a detailed case-by-case review of the 75 case histories that were used to develop the Xu and Zhang (20,09) regression equations.
* Professor Briaud made a site visit to Jocassee Dam to become familiar with the properties of the rockfill materialr and other aspects of its cOnstruction. He addressed questions ,regarding the appropriateness of using his erosion categorization methodology in the Xu and Zhang (2009) breach parameter methodology. He also confirmed the low erosion category for Jocassee Dam.
'-in this report-the terms breach development time, and breachformation time are used interchangeably.
PAGE 4
 
IJSIn            association with **
VALIDATION OF HRR BRF.ACH HYDROGRAPH FOR JOCA SSEE DAM p
Revised regression equations were developed by Dr. Xu for sensitivity studies on the Jocassee Dam HRR breach hydrograph based on changes that were made to the original Xu and Zhang (2009) case histories data set to address the agency questions and some other issues identified during our detailed review. The revised equations were also applied to Teton Dam to compare with the observed breach parameters and those obtained by Xu and Zhang (2009) an d the observed breach parameters.
      *Sensitivity studies were conducted based on the revised Xu and Zhang and the Froehlich (1995a and 2008) regression equations applied to Jocassee Dam. The resulting breach parameter estimates were used by HDR in the HEC-RAS model to obtain breach hydrographs .for a deterministic sunny-day breach of the Jocassee Dam.
A comparison of these hydrographs with the HRR breach hydrograph submitted to the NRC by Duke (2013) provided support for the HRR breach hydrograph.
2.4    Report Outline
* Section 3 of this rePOrt contains an update of the background discussion of Jocassee Dam that was provided in our February 2013 report (Ehasz and Bowles 2013).
* Section 4 presents the outcomes of Professor Briaud's visit to Jocassee Dam his confirmation of the low erosion category for the rockfill material for this dam.
* Section 5 refers to a summary of the original Xu and Zhang. (2009) methodology and its original implementation for Jocassee Dam contained in Appendix B.
* Section 6 presents the findings of the review of the original Xu and Zhang (2009) methodology that we conducted with Dr. Xu, including the changes made to the case histories data set to address the FERC and NRC questions and the development of revised regression equations.
* Section 7 presents the sensitivity study using the revised regression equations for Jocassee Dam, which .prOvides support for the breach hydrographs submitted in the Hydrologic Reevaluation Report (HRR) to the NRC by Duke on March, 12, 201i3 (Duke 2013).
* Section 8 presents the overall conclusions and responds to the questions presented by the FERO and NRC.
* Appendix A contains Professor Briaud's complete report.
* Appendix B. summarizes the original Xu and Zhang (2009) methOdology and its original implementation for Jocassee Dam on which the HRR hydrograph (Duke 2013) is based.
* Appendix C contains a bench marking/comparative analysis for rockfiUl dams and characteristics of recent failures relative to Jocass ee Dam.
* Appendix D contains the detailed data supporting the revision to the Xu and Zhang regression equations.
PAGE 5
 
TI          "RInassociation with l*4~ C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Appendix E contains a review of this report ,by Dr. Mark Morris, an internationally recognized European expert in dam breach analysis and breach hydrograph development.
The most significant outcome and conclusions of this report are the verification and revision of the data set utilized to develop the breach parameter regression equations presented in the Xu and Zhang (2009) and the verification of the interpretation of the erosion characteristics on which the Xu and Zhang (2009) methodology is based. Through sensitivity analyses based on the revised Xu and Zhang regression equations and the Froehlich (1995a and 2008) regression equations it is demonstrated that the HRR .breach hydrograph (Duke.2013) for a deterministic sunny-day piping breach of the Jocassee Dam is a reasonable and contservative estimate.
PAGE 6,
 
~1MIENprn    ~in.A5I 58W  ~mIW85VW  5155121 UIIEII.MI                  - WWIIRIINU.MI.Z  11(2115 £51R82158.        LumqU3ala, W                5(2 I..r~  £..I~m  CII
            ....... dV          ..............................                              r* ...............              ir* .............                i,,.-7 VAUDA      170ff Of  HRR BREACH HYRGRP FOR JOCASSEE DAM
 
==3.0  BACKGROUND==
 
Our February 2013 (Ehasz and Bowles 2013) report gave some details of the Jocassee Dam embankment, the general piping failure mechanism and the potential piping failure modes for the dam. As background and for continuity, this report will repeat some of this information in this section, especially with regard to the characterization of the dam and it's attributes as they affect erodibility during development of a postulated breach.
3.1     Characterization of Jocassee Dam The following statements describe the detailed characteristics of the dam and are significant to dam performance and breach characteristics (see Figures 3.1 and 3.2):
* The dam was completed in 1967. It has been continuously monitored and has performed very well to the present; meeting or exceeding FERO standards. Even though the dam was designed and constructed in the mld-1960's it has all the modem and defensive measures of the rockfill dams designed and constructed today. A detailed review of the Jocassee Dam and it's performance was conducted 20 years after completio       as described in the report entitled, "Jocassee Main Dam Design, Construction and Performance", by George F. Sowers, April 1987.
Figure 3.1. Google aerial view of Jocassee Dam PAGE 7
 
                      .   ....               .f..         ff -- 7rE
                                                                      . ..     ..       i'L ..      . . . . . . 1 F j E'S   Q.% .1-,
In association with R .ILC VALIDATION OF HRR BREACH H'YDROGRAPH FOR JOCA$$EE DAM U
(b)(7)(F)
                                          ~~JOCASf.;E                             PAM CRO*;  s~cri0N Figure 3.2. Jocassee Dam cross section (Sowers 1987)
Security sensitive Information. Withhold from public disclosure under 10 CFR 2.390 (d)( 1)
Beginning at the rock foundation levelI,(b)(l)F)                                                                       I (b)(7)(F)v                                                                                                             ri To decrease the hydraulic *radients as low as possible (b)(7)(F) 0
            ,oUv*t-foundation contact.                                                                                       lalong the To protect the core materials from internal erosion, material movement and potential piping of the core, I(b)(7)(F)
(b)(7)(F) linto the   larger rockfill materials.
v PAGE PAGES 8.
 
I':z.. *.sz..             -. :..:..*u#....:u.. - --   ;iI.2 ll~l   .. .Sm.l   UUUzaIL*r.
Ua,.~pgjLajr-i z*
Uaw
                                                                                                              *.! a U L-r" -
                                                                                                                  --        *I KJDgS             Insocaonwt1A                   C
* VALIDATION OF HRR BREACH HYVDROGRA PH FOR JOCASSEE DAM Quality Control: selection of materials and documentation was enforced by the Resident Engineering staff and maintained as an. important function during .the construction.' As indicated above, the selection and placement of the various Zones was carefully done so as 'to maintain 'the' compatibility'of adjacent materials-to eliminate migration of materials and maintain a stable embankment. Grain-size and density testing .to verify selection of soil. and rockfill materials properties and' compaction were condUcted .at intervals tO confirm and maintain control of the placements. Field inspection was maintained during construction with Duke Engineering staff observing and. interfacing to ensure the design*
intent was maintained throughout construction.
All Of the above facts are important when considering the potential for internal erosion and piping at Jocassee Dam. The materials and features employed during design and construction,.
All Of the above facts are important when considering the potential for internal erosion and piping at Jocassee Dam. The materials and features employed during design and construction,.
as described above, were all-designed to minimize the possibility of piping .and .failure of the embankment.
as described above, were all-designed to minimize the possibility of piping .and .failure of the embankment. Thus, it is even difficult to .envision the development of a piping condition .at the Jocassee Dam, given the defensive design measures incorporated and with the past 45 years of excellent performance. However, a deterministic approach is being .used to postulate a sunny-day piping failure for Jocassee Dam, Many of the above-listed facts .also affect the. breaching, characteristics Under the hypothesis that. a .piping failure occurs. Ideally these favorable physical properties would be taken into consideration in estimating breach parameters.                             Unfortunately regression methods for estimating breach parameters are .somewhat limited .in the. degree ,to which this can be done.
Thus, it is even difficult to .envision the development of a piping condition .at the Jocassee Dam, given the defensive design measures incorporated and with the past 45 years of excellent performance.
An exception is the Xu and Zhang (2009) methodology in which erodibility is considered.
However, a deterministic approach is being .used to postulate a sunny-day piping failure for Jocassee Dam, Many of the above-listed facts .also affect the. breaching, characteristics Under the hypothesis that. a .piping failure occurs. Ideally these favorable physical properties would be taken into consideration in estimating breach parameters.
3.2      Piping Failure Mechanism For piping to occur, all four of the following Conditions, must exist:
Unfortunately regression methods for estimating breach parameters are .somewhat limited .in the. degree ,to which this can be done.An exception is the Xu and Zhang (2009) methodology in which erodibility is considered.
: 1) there must be a source of water and a flow path;
: 2) there must be an unprotected exit for the eroded material;
: 3) there must be. erodible, material in the flow            path';  and
: 4) the material must .support a roof for a pipe to enlarge and .propagate.
The piping phenomenon must originate with internal erosion and material movement' somewhere within the dam or its foundation, such .as at the abutment-core contact, and exit downstream. The flow of water and materials must have an exit, to which the flow can carry matedials and then progress upstream along some erosion path. and move mat~erials from luPAGE                                                              9
 
I.n    ~ wrny,    .O~aev ,,      Ir, ,u      u  ;;-, vv;ui,. i ,-, 'pu,Ij... .........                93 .-
KIR                Inassociation wath~l*.*CZ
                                              ' '*        VAL.IDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM*
upstream. With 'increasing movement of large amounts of water carrying materials, the flow
    .would eventually form a flow path within the downstream rockfili portiOn of'the dam, referred to as a      "pe". If the process, called the "breach initiation phase", continues and the flows increase, it would .progressively engage a larger and larger portion of the rockfill and eventually form a raveling Condition within the rockfillt large enough to make the downstream shell of the dam unstable. If it becomes unstable enough to move. rockfill downstream *or to cause pockets through Collapses, it could then expose the core, which is the water retaining structure of the dam for the upstream reservoir. If support is removed from the downstream side of the core, it would become unstable and partially collapse. The breach of the dam would progress as it overtops the core and form an overtopping breach and failure of the dam; this is Considered the>
Start of the "breach formation phase".
The defensive measures within the Jocassee Dam are designed, constructed and incorporated, with consideration of all four of the necessary conditions for piping, to minimize any potential for the piping process to occur.
3.3        Potential Piping Failure Modes for Jocassee Darn In a Potential Failure Modes Analysis (PFMA), which was facilitated by RAC Engineers &
Economists and' included engineers from.Duke Hydro and HDR,. th*a mn-t Iik.lv (i* "lg*
unlikely") pipingl failure mode was determined tobe' piping;th..rougn'*t**                                      I (I()()PiPing                                      through the rock foundation of the main dam is considered
*to be a Significantly less lkely piing failure mode due to the tight rock formations and low seepage rates in the I~b()(F)            j The po~tential for piping through the main dam embankment is extremely Unlikely for the reasons described in our February 20*13 report (Ehasz and Bowles 2013). Each of these failure modes is described in detail in Appendix A of our February 2013 report (Ehasz and Bowles 2013).
P A 6 e-lO
 
**l*ElE*iJr*_ *l*_l*_l#rm31f
* Jr3*miivl.* 4fI#f] *mmf*Ifl m WWlIfmfaEJIEJ #EEJIWl IJE3EJil* EJI.*BE 8EJ.%Jm#e.* zm*m J*  L s*#Emallm VALIDATION OF HRR BREACH H YDROGRAPH FORJOCASSEE DAM 4.0    CONFIRMATION OF JOCASSEE DAM ERODIBILITY 4.1      Overview Dam erodibility is described by Xu and Zhang (2009) as a relative measure based on the embankment material compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information. In their regression analysis, Xu and Zhang (2009) found dam erodibility to be the most important control Variable for predicting all five breach parameters. The three erosion categories (Jow, medium or high) used in the Xu and Zhang (2009) equationS referenced the technical lecture paper by Briaud (2008), whereby soils and rocks are classified into various erosion resistance categories based on water velocity or hydraulic shear stress at the soil-water interface (see Figures 4.1 a and 4b).
Therefore it is significant to establish the compatibility of Xu and Zhang's application of the Bdiaud erosion categories with the categorization, system developed by Briaud (2008).
To directly address the erodibility questions and to develop a clear explanation of the three erosion categories (low, medium and high) used by Xu and Zhang (2009) and the six erosion categories (non-erosive, very low, low, medium, high and very high) developed by Briaud (2008), Professor Briaud made a site visit to the JoCassee Dam and participated in a face-to-face meeting with Dr. Yao Xu in Denver. A summary of the Professor Briaud's responses to several questions about the use of his erosion categorization Scheme by Xu and Zhang (2009) is provided in Section 4.2. A summary of Professor Briaud's independent evaluation of the erosion category for Jocassee Dam is contained in Section 4.3. Professor Briaud's complete report is contained in Appendix A.
4.2      Use of Briaud's Erosion Categorization Scheme by Xu and Zhang (2009)
The site meeting with Professor Briaud took place on October 3rd and                              4 th 2013 at the Jocassee Dam site in South Carolina and at the offices of Duke Energy at the Oconee Nuclear Plant. The purpose of the site visit was for Professor Briaud to become familiar with the Jocassee Dam and the materials used for construction. In addition, he was asked if his erosion categories are applicable to erosion during an earth dam breach and specifically:
* Is your (Briaud) work applicable to earth dam erosion?
* What is your (Briaud) characterization of Jocassee Dam erosion characteristics?
* Please comment on Xu and Zhang work on dam breach, and how 'the three erodibility classifications, used by Xu and Zhang, compare to your six classifications.
P AG E..11
 
VAUO.ITJON OF: HRR BREATH HYDROGRAPH FOR JOCASSEE DAM DA%4 urn+
EROSION RATE ISS, 0.I, IlI..                            1O            IU V1ELOCITY (rn/a)
Figure 4.1a. Overall erosion category for Jocassee and Toton Damns (velocity based )
iDfl ti J()f +%%tIF 0660 II16            r    II I            I, lION EROSION RATE      IN      -
(mm/br)
VwL.u Koch O.'
S          I      I.I    Ili,  1i1111 Iew  101ms SHEA.+R STRES.*PS (Pu)
Figure 4.lb. Overall erosion category for Jocanssee and Tetan Dams (shear stress based)
Professor Briaud prepared a detailed report on his site visit to Jocassee Dam (Briaud 2013) and his answers to the above questions (see Appendix A). A summary of his responses is as follows:
      *Is your (Briaud) work applicable to earth dam erosion? The erosion function is characterizing the behavior of the soil at the element level so it is broadly applicable to many erosion siutos, including the erosion and breach process for earth and rockfili embankment dams. The erosion function is the curve which links the erosion rate to the water velocity or the hydraulic shear stress at the sol-water interface; it is to erosion studies what the stress strain curve is to deformation problems. It is a consiutv equation, which can be used in numerical methods as easily as in simple hand calculations.
P AG e 12
 
                                    *'        VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM
      *What is your (Briaud) characterization of Jocassee Dam erosion characteristics? The erodibility of the Jocassee Dam materials was. evaluated; and the Jocassee Cross-section materials are clearly and conservatively established to be "low erodibility" materials (see Section 4.3).
      *Please comment on Xu and Zhang work on dam breach, and how the three erodibility classifications, used, by Xu and Zhang, compare to your six classifications. The XU and Zhang regression equations do show and consider that erodibility is the most significant factor in the development of embankment breach parameters. Thus, it is most important, in my evaluation of their"equations, that I have found that Xu and Zhang have assigned tlhe "low, medium or high" erodibility categories in a way that is consistent with my research findings for the variousdams represented by the data Used to establish their regression equations. The categorization reflects the fact that the types of materials typically used for the construction of earth dams fall into the Briaud erosion categories 2, 3, and 4 with some Category 5 materials for rockfill dams. Indeed fine sands and non-plastic silts (Briaud category 1)      .and  jointed and intact rock (Briaud category 6) are not Used in earth da m engineering.
4.3    Confirmation of Low Erosion Category for Jocassee Dam To evaluate the erosion category for the Jocassee Dam, the following process. was Used by Professor Briaud:
* A cross section of the dam was drawn, see Figure 4.2.
* An erosion category was chosen for each material within thedam based on the specified values of the median particle size, Dho (see Table 4.1); since the drawings specified that the D80 was the minimum allowed, this selection is conservative.
      *Three erosion levels were placed across the dam as shown on the Figure 4.2 at levels AA, BB, and CC,
      *For each level, a weighted average of the erosion category was determined according to the length of material exposed to the flow for that level:
c    I=i L,EC,
    *. Where EC is .the average erosion category,. L1 is the length of material i exposed to water, and EC1 is the erOsion category for material i (low = 4, medium  = 3and high  = 2).
* Section AA gave an EC value of 3.93, section BB gave 4.08, and =section CC gave 4.11.
* Therefore, the overall average erosion category for Jocassee Dam is clearly .4 or low erodibility.
SP                AG6E 13


===3.2 Piping===
t-...onir,* ,.*ecur-ny *en*,i.'.*uvo~gol(~   l,~~ - VVIUIUtQIQ ai[Oiii p.uuIwt ui~I.'GOsure* per :u i..rt't £.J*UJ(u/
Failure Mechanism For piping to occur, all four of the following Conditions, must exist: 1) there must be a source of water and a flow path;2) there must be an unprotected exit for the eroded material;3) there must be. erodible, material in the flow path'; and 4) the material must .support a roof for a pipe to enlarge and .propagate.
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOcASSEE DAM Figure 4.2. Jocassee Dam cross section used in determination of erosion category Table 4.1. Jocassee Materials Evaluation by Briaud Material                                                                Estimated critical      Erosion (Figure 4.2)                          Description                          velocity (mis)      Category (b)(7)(F)
The piping phenomenon must originate with internal erosion and material movement'somewhere within the dam or its foundation, such .as at the abutment-core contact, and exit downstream.
Rock fill Impervious core Random fill Filters The above conservative analysis by Professor Briaud clearly shows that the erosion category of the Jocassee Dam is low or Category IV, for erosion rates based on velocity or shear stress as shown on Figures 4.1a and 4b, respectively.
The flow of water and materials must have an exit, to which the flow can carry matedials and then progress upstream along some erosion path. and move mat~erials fromluPAGE 9 I.n ~ , wrny .O~aev Ir, ,, ,u u ;;-, vv;ui,. i ,-, 'pu,Ij...  
A similar evaluation was conducted by Professor Briaud for the Teton Dam since this dam was used by Xu and Zhang (2009) as an illustration and evaluation of their original regression equations. In addition, an application of the revised Xu and Zhang regression equations to the Teton Dam failure is reported in Section 6.5. Professor Briaud showed that the erosion category of the Teton Dam is at the boundary between medium and high or Category Ill/il, for erosion rates based on velocity or shear stress as shown on Figures 4. Ia and 4b, respectively.
.........
The high resistance to erosion (low erodibility) of compacted rockfill has recently been affirmed by the experience of flooding and water passage through a rockflll embankment in the February 2014 flooding at the Tokwe-Mukosi Dam in Zimbabwe. The Dam is a Concrete Faced Rockfill Dam (CFRD) and experienced an extreme flood during construction prior to placement of the concrete face. It successfully passed extreme floodwaters through the compacted rockfill embankment with only local raveling and maintained stability. See Appendices C.1 and 0.2 for a description and photo s.
.... .-93 KIR In association wath~ ' * ' VAL.IDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM*upstream.
P A GE 1.4
With 'increasing movement of large amounts of water carrying materials, the flow.would eventually form a flow path within the downstream rockfili portiOn of'the dam, referred to as a "pe". If the process, called the "breach initiation phase", continues and the flows increase, it would .progressively engage a larger and larger portion of the rockfill and eventually form a raveling Condition within the rockfillt large enough to make the downstream shell of the dam unstable.
If it becomes unstable enough to move. rockfill downstream
*or to cause pockets through Collapses, it could then expose the core, which is the water retaining structure of the dam for the upstream reservoir.
If support is removed from the downstream side of the core, it would become unstable and partially collapse.
The breach of the dam would progress as it overtops the core and form an overtopping breach and failure of the dam; this is Considered the>Start of the "breach formation phase".The defensive measures within the Jocassee Dam are designed, constructed and incorporated, with consideration of all four of the necessary conditions for piping, to minimize any potential for the piping process to occur.3.3 Potential Piping Failure Modes for Jocassee Darn In a Potential Failure Modes Analysis (PFMA), which was facilitated by RAC Engineers
&Economists and' included engineers from.Duke Hydro and HDR,. mn-t Iik.lv unlikely")
pipingl failure mode was determined tobe' piping; I (I()()PiPing through the rock foundation of the main dam is considered
*to be a Significantly less lkely piing failure mode due to the tight rock formations and low seepage rates in the I~b()(F) j The po~tential for piping through the main dam embankment is extremely Unlikely for the reasons described in our February report (Ehasz and Bowles 2013). Each of these failure modes is described in detail in Appendix A of our February 2013 report (Ehasz and Bowles 2013).P A 6 e-lO


4fI#f] m WWlIfmfaEJIEJ
*.,;,.,.,      ,;,.,*    ;*,,;,    .,,,,,*,.    - ~;.';,;,,.;, ;,,.,, i.-;.;;., hlI.,; ,p,,. K    £7F,;.J;*,I.-
#EEJIWl L  VALIDATION OF HRR BREACH H YDROGRAPH FOR JOCASSEE DAM 4.0 CONFIRMATION OF JOCASSEE DAM ERODIBILITY
SVALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 5.0      ORIGINAL XU AND ZHANG REGRESSION EQUATIONS in our February 2013 report (Ehasz and Bowles 2013) it was concluded that the HRR (DUKe 2013) breach hydrograph for the: Jocassee Dam iS a realistic but conservative breach hydrograph that has good defendability based on the following:
: 1) the validity of the Xu and Zhang (2009) method;
: 2) the conservative nature of the median brec aaeter estimates:
: 3) a piping failure mode initiating in thel          jjjj(I 4), the deposition of rockfill immediately below~the dam; 5). the low erosion category of the rockfill material; and
: 6) the various characteristics of a modern dam that were included in the design and.
construction of the Jocassee Dam.
The original Xu and Zhang regression methodology and its previous implementation to Jocassee Dam are described in Appendix B. This appendix provides background for Section 6.
where we address the questions raised by the FERC .and the NRC. It also provides background for section 7 where we describe the implementation of a revised version of the Xu and Zhang equations in a sensitivity analysis, which provides support for the breach hydrograph submitted
      'in the Hydrologic Reevaluation Report (HRR) to the NRC .by Duke on March 12, 2013 (Duke 2013).
Section B.2 Summarizes the breach parameters and control Variables in the Xu and Zhang (2009) regression equations. section B.3 discusses the case histories that were used to develop these equations and Section* B.4 summarizes the regression equations, including their confidence limits. The implementation of the original Xu and Zhang (2009) methodology for the Jocassee Dam is described in Section B.5 and details of the use of the failure time estimate in the HEC-RAS model are discuss~l in Section B.6.
P AG6E 15'


===4.1 Overview===
'VJI5  5I@*iI  @G'UIII* 517 l~tw    mlllVID1la
Dam erodibility is described by Xu and Zhang (2009) as a relative measure based on the embankment material compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information.
                                      *V.          - IrWIrn4I55
In their regression analysis, Xu and Zhang (2009) found dam erodibility to be the most important control Variable for predicting all five breach parameters.
                                                      *V*4l**.'.*d*ll¥              Hl~  W    ,..r I [I LI.IIl.J U
The three erosion categories (Jow, medium or high)used in the Xu and Zhang (2009) equationS referenced the technical lecture paper by Briaud (2008), whereby soils and rocks are classified into various erosion resistance categories based on water velocity or hydraulic shear stress at the soil-water interface (see Figures 4.1 a and 4b).Therefore it is significant to establish the compatibility of Xu and Zhang's application of the Bdiaud erosion categories with the categorization, system developed by Briaud (2008).To directly address the erodibility questions and to develop a clear explanation of the three erosion categories (low, medium and high) used by Xu and Zhang (2009) and the six erosion categories (non-erosive, very low, low, medium, high and very high) developed by Briaud (2008), Professor Briaud made a site visit to the JoCassee Dam and participated in a face-to-face meeting with Dr. Yao Xu in Denver. A summary of the Professor Briaud's responses to several questions about the use of his erosion categorization Scheme by Xu and Zhang (2009)is provided in Section 4.2. A summary of Professor Briaud's independent evaluation of the erosion category for Jocassee Dam is contained in Section 4.3. Professor Briaud's complete report is contained in Appendix A.4.2 Use of Briaud's Erosion Categorization Scheme by Xu and Zhang (2009)The site meeting with Professor Briaud took place on October 3rd and 4 th 2013 at the Jocassee Dam site in South Carolina and at the offices of Duke Energy at the Oconee Nuclear Plant. The purpose of the site visit was for Professor Briaud to become familiar with the Jocassee Dam and the materials used for construction.
* VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 6.0      REVIEW AND REVISION OF XU AND ZHANG REGRESSION EQUATIONS 6.1       Approach to Review and Revision The FERC and NRC questions about the use of the Xu and Zhang (2009) methodology are summarized in Section 2.2 and are repeated here:
In addition, he was asked if his erosion categories are applicable to erosion during an earth dam breach and specifically:
: 1) Precedence - where has use of the Xu and Zhang (2009) methodology been accepted?
* Is your (Briaud) work applicable to earth dam erosion?* What is your (Briaud) characterization of Jocassee Dam erosion characteristics?
: 2) Chinese case histories - about 43% of the dlam failure case histories on which the Xu arnd Zhang (2009) methodology is based are for Chinese dams for which little information is available in :the US.
* Please comment on Xu and Zhang work on dam breach, and how 'the three erodibility classifications, used by Xu and Zhang, compare to your six classifications.
: 3) Representation of case histories for roclcflll and other low erodibility dams                        - the data set of dams used by Xu and Zhang (2009)to develop the regression equations has only three dams that are considered large (i.e. > 15 meters high) embankment dams with low erodibility and both of these dlams are all outside of the US.
P AG E..11 VAUO.ITJON OF: HRR BREATH HYDROGRAPH FOR JOCASSEE DAM DA%4 urn+EROSION RATE ISS, 0.I, IlI.. 1O IU V1ELOCITY (rn/a)Figure 4.1a. Overall erosion category for Jocassee and Toton Damns (velocity based )iDfl ti II16 066 r 0 II J()f +%%tIF lION EROSION RATE IN -(mm/br)O.'I I, Koch VwL.u S I I.I Ili, 1i1111 Iew 101ms SHEA.+R (Pu)Figure 4.lb. Overall erosion category for Jocanssee and Tetan Dams (shear stress based)Professor Briaud prepared a detailed report on his site visit to Jocassee Dam (Briaud 2013) and his answers to the above questions (see Appendix A). A summary of his responses is as follows:*Is your (Briaud) work applicable to earth dam erosion? The erosion function is characterizing the behavior of the soil at the element level so it is broadly applicable to many erosion siutos, including the erosion and breach process for earth and rockfili embankment dams. The erosion function is the curve which links the erosion rate to the water velocity or the hydraulic shear stress at the sol-water interface; it is to erosion studies what the stress strain curve is to deformation problems.
: 4) Use of the Briaud erosion categories                   -   how Were the erosion categories developed by Briaud (2008) applied in developing the Xu and Zhang (2009) methodology and are they applicable tO dam breach?
It is a consiutv equation, which can be used in numerical methods as easily as in simple hand calculations.
5). Breach time definition,- the definition of time to failure used by Xu and Zhang (2009),
P AG e 12 VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM*What is your (Briaud) characterization of Jocassee Dam erosion characteristics?
includes at least part' of the breach initiation phase in addition to the breach formation process unlike other regression methods that include only the breach formation process.
The erodibility of the Jocassee Dam materials was. evaluated; and the Jocassee Cross-section materials are clearly and conservatively established to be "low erodibility" materials (see Section 4.3).*Please comment on Xu and Zhang work on dam breach, and how the three erodibility classifications, used, by Xu and Zhang, compare to your six classifications.
To respond to these questions raised by the regulatory agencies we arranged for the primary author of the Xu and Zhang,(2009) technical paper to meet with us in the Denver Offices of URS during the period, November 7        - 10, 2013. Those in attendance were Dr. Yao Xu of the China Institute of Water Resources and Hydropower Research, Dr. David Bowles with RAC Engineers
The XU and Zhang regression equations do show and consider that erodibility is the most significant factor in the development of embankment breach parameters.
    & Economists and, Utah ,State University, Professor Jean-Louis Briaud with Texas A&M University, Joseph Ehasz with URS, and Adam Johnson from Duke Energy. On the morning of Friday November 8, Dr. Xu and Professor Briaud independently met with Tony Wah!, Bruce Feinberg and Dan Osmun of the Bureau of* Reclamation (Reclamation) at Reclamation's Hydraulics Laboratory in the Federal Center near Denver. This meeting was in response to Tony Wahr's request to meet with Dr. Xu-during his Visit to the US to discuss his questions regarding the Xu and Zhang (2009) methodology.
Thus, it is most important, in my evaluation of their" equations, that I have found that Xu and Zhang have assigned tlhe "low, medium or high" erodibility categories in a way that is consistent with my research findings for the variousdams represented by the data Used to establish their regression equations.
The four-day working session was divided into two parts: first discussions of the agency questions and. second a detailed case-by-case ,review of the 75 case histories that were used to develop the original Xu and Zhang (2009) regression equations. The ultimate objective was to make appropriate changes to the Xu and Zhang (2009) case histories data set to address the agency questions and any other issues identified during our review so that Dr. Xu could develop revised regression equations.
The categorization reflects the fact that the types of materials typically used for the construction of earth dams fall into the Briaud erosion categories 2, 3, and 4 with some Category 5 materials for rockfill dams. Indeed fine sands and non-plastic silts (Briaud category 1) .and jointed and intact rock (Briaud category 6) are not Used in earth da m engineering.
P A GE 16


===4.3 Confirmation===
                          ~VALIDATION                  OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM A summary of our discussions with Dr. Xu and Professor Briaud for each of the questions raised by the FERC and NRC and for some additional issues that were identified during these discussions is presented in Section 6.2. 'Specifically, these additional issues, which are discussed in Section 6.2.6 - 6.2.8, were'as'follows:
: 1) Erosion category assigned to dams with corewalls anid concrete-faced rockflll dams
: 2) Differences in values of breach parameters and control variable in other sources, especially Froehlich (!995a and'b and 2008) and WahI (1998)
: 3) Inconsistencies between peak br~each flows~and breach development times The changes made to the data set of case histories are summarized in Section 6.3 and detailed in Appendix D. The revised regression equations are presented in section 6.4 and their test implementation for Teton Dam is discussed in Section 6.5. Their implementation for Jocassee Dam as a sensitivity study to evaluate the HR R hydrograph is presented in Section 7.
6.2,    Summary of Review Findings 6.2.1 Precedence In the U.S. dam safety community the acceptance of new methodologies often comes through adoption by the rniajor government dam, owners ,and regulatory ,agencies. These agencies include the US Army Corps of Engineers (USACE) and the Bureau of Reclamation as major government datm owners and the FERC as the federal regulator for hydropower dams. As with any new methodology it takes time for it to become accepted into practice and for precedence to be established. From'this perspective the Xu and Zhang (2009) methodology is st~i quite new.
In,the case of the Xu and Zhang (2009) methodology, the questions raised by the FERC and the NRC must be addressed as part of the process if this methodology is to become more widely accepted. Addressing these questions is the purpose of this section of the report.
The inclusion Of erodibirity in the Xu and Zhang (2009) regression methodology is widely recognized *as a Significant advantage over other breach parameter estimation regression analysis methodologies. In fact Xu and Zhang (2009) demonstrated that erodibility is the single most important control variable in Ipredicting all five breach parameters. Such a significant advantage justifies a careful evaluation of the Xu and Zhang (2009) methodologyto0 see if it can be more rapidly put to use in the profession.
H  i i  .                      wp


of Low Erosion Category for Jocassee Dam To evaluate the erosion category for the Jocassee Dam, the following process. was Used by Professor Briaud:* A cross section of the dam was drawn, see Figure 4.2.* An erosion category was chosen for each material within thedam based on the specified values of the median particle size, Dho (see Table 4.1); since the drawings specified that the D 8 0 was the minimum allowed, this selection is conservative.
i        i      l  . . El
*Three erosion levels were placed across the dam as shown on the Figure 4.2 at levels AA, BB, and CC,*For each level, a weighted average of the erosion category was determined according to the length of material exposed to the flow for that level: c I=i L, EC,*. Where EC is .the average erosion category,.
                                  ..  *  .......... *~~*  l  5lll'*t~tZltl*
L 1 is the length of material i exposed to water, and EC 1 is the erOsion category for material i (low = 4, medium = 3and high = 2).* Section AA gave an EC value of 3.93, section BB gave 4.08, and =section CC gave 4.11.* Therefore, the overall average erosion category for Jocassee Dam is clearly .4 or low erodibility.
* 5..  . a  E  U  . *-* -t n'  .,  *.a-.
SP AG6E 13
*wow*oam*w      *v*Mm  @*jr VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSUE DAM Three uses of the Xu and Zhang (2009) methodology have been identified, as follows:
: 1) In developing a Simplified risk assessment procedure for small reservoirs for the equivalent of the dam safety regulator2 in England and Wales [the Environment Agency and the Department for Environment, Food and Rural Affairs (Defra)], HR Wallingford (2014) evaluated the Xu and Zhang (2009) methodology for estimating peak breach flows. In' their comparative study they concluded'that the Froehlich (1995a) and Xu and Zhang (2009) approaches both 'yield "conservative, estimates of peak breach flow for highly erodible embankment dams and that the physically-based HR BREACH model (Mohamed 2002) and the simplified AREBA model (HR Wallingford 2012) provide more realistic estimates.
: 2) The Xu and Zhang (2009) methodology *is included in the breach parameter methodologies that are available in the USACE HEC-RAS computer model, which Is widely used in the US for dam breach modeling. It Was also included in a discussion of "Hydraulic modeling aspects that are unique to performing a .dam break analysis" by Brunner (2011), who is the USACE Hydrologic Engineering Center (HEC) technical lead for the HEC-RAS model. In both cases a caution is given that "the data Xu and Zhang used in the development of the equation for breach development time includes more of the initial erosion Pieriod and post erosion period than what is generally used in HEC-RAS for the 'critical breach development time" (Brunner 2011). In addition it is stated that-".. because of this fact, the XU and Zhang equation .for brea'ch development time should not be used in HEC-RAS" (Brunner 2011).                              However, in a PersOnal Communication (December 2013) with Dr. Brunner he agreed that it was. reasonable to
              *iteratively change the breach progression relationship and the values orifice and weir coefficients in the manner described in Section B.6 for Jocassee Dam when using failure time estimates based on Xu and Zhang '(2009). He also expressed interest in replacing the original Xu and Zhang (2009) regression relationships in HEC-RAS with the revised relationShips that are described S ection 6.14.
: 3) We understand from Dr. Xu that the Xu and Zhang (2009) methodology is being applied by government agencies in China.
6.2.2      Chinese Case Histories
    .About 43% or' 32 of the 75 dam failure case histories on Which the Xu and Zhang (2009) methodology is based are for Chinese dams. None of these case histories are included in the Wahl (1998) data base of case histories, although :that data base' may be due. for anupdlate and ifone is undertaken it would seem beneficial to include Case histories from China.
2,In  England and Walesthe Environment Agency ,is responsible. for enforcement of reservoir safety requirements for specific reservoirs "in the: interest of safety" that 'are determined by Panel Engineers who .are appointed by the Secretary for State. Defra has a policy role for deveiopmnent of reservoir safety legislation and guidance.
P A 6E 18


l(~ l,~~ -VVIUIUtQIQ ai[Oiii p.uuIwt per :u i..rt't VALIDATION OF HRR BREACH HYDROGRAPH FOR JOcASSEE DAM Figure 4.2. Jocassee Dam cross section used in determination of erosion category Table 4.1. Jocassee Materials Evaluation by Briaud Material Estimated critical Erosion (Figure 4.2) Description velocity (mis) Category (b)(7)(F)Rock fill Impervious core Random fill Filters The above conservative analysis by Professor Briaud clearly shows that the erosion category of the Jocassee Dam is low or Category IV, for erosion rates based on velocity or shear stress as shown on Figures 4.1a and 4b, respectively.
',u.I*fa;bou~uuy *ur,.,u*vu In'urmr~nin- wannwu ,rrumpuDIIc asciosuiweper "U (~i.C [LJWu(O)
A similar evaluation was conducted by Professor Briaud for the Teton Dam since this dam was used by Xu and Zhang (2009) as an illustration and evaluation of their original regression equations.
        ~~JRS        Inassociation withRC VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM-SIn discussing the quality of data for the Chinese case histories, Dr. Xu stated that he felt that the available information was similar, in quality to what he had examined in his research for: case histories from. the US' and. some other countries. In at least .two cases-detailed failure investigations reports have been prepared for the Banqiao and. Shimantan Dam* failures. Dr. Xu referenced a report by Ru and Niu (2001), which contains information on many Chinese dam breaches. This report, is readily available outside of China. He also had access to a detailed database on dam failure Case histories, but this is not available outside China. However, Dr. Xu made extensive reference to this data base during-our detailed evaluation of the case, histories that were used as a basis for developing the Xu and Zhang (20.09) regression methodology (see Section 6.3).
In addition, an application of the revised Xu and Zhang regression equations to the Teton Dam failure is reported in Section 6.5. Professor Briaud showed that the erosion category of the Teton Dam is at the boundary between medium and high or Category Ill/il, for erosion rates based on velocity or shear stress as shown on Figures 4. Ia and 4b, respectively.
  .Dr. Xu also described a screening process that he performed before using the case history data from China and other countries in his regression analysis. Any case histories .where .significant Concerns existed about the quality of the available data were omitted. It should be noted that the Chinese data used by Xu include some more recent-dam breaches than used by others, such as Froehlich (1995 and 2008).*
The high resistance to erosion (low erodibility) of compacted rockfill has recently been affirmed by the experience of flooding and water passage through a rockflll embankment in the February 2014 flooding at the Tokwe-Mukosi Dam in Zimbabwe.
We also enquired about the quality of construction, for the Chinese .case history, dams. Dr. XU indicated that dams designed and constructed before 1977 were not up to modern standards, and that modern construction methods and ,equipment were not used. Dams. constructed since*
The Dam is a Concrete Faced Rockfill Dam (CFRD) and experienced an extreme flood during construction prior to placement of the concrete face. It successfully passed extreme floodwaters through the compacted rockfill embankment with only local raveling and maintained stability.
1977 can be considered to meet modern standards. The .significance for the* Chinese case histories* is first that there are more of them because of the poorer standards prior to 1977.
See Appendices C.1 and 0.2 for a description and photo s.P A GE 1.4
Secondly, the poorer construction, and in particular the poorer compaction .of Chinese.
*.,;,.,.,  
embankment dams constructed prior to 1977, would be expected to result in a more erodible-dam once a breach process has initiated. Unlike most other regression methods, for estimating breach parameters, thel XU and Zhang (2009) approach includes the erosion category as a means of accounting for the more erodible characteristic of the Chinese dams that were constructed prior to 1977. The .approach adopted' by Xu and Zhang (2009) to account for the effect of poor construction in the development-of their regression equations is summarized in Section .6.2.4. We also make reference to this .approach in. Section 6.3.2, in which we summarize the critical review that we. performed of the entire Xu and Zhang (2009) data set, including all Chinese case histories.
-~;.';,;,,.;, ;,,.,, i.-;.;;., hlI.,; ,p,,. K SVALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 5.0 ORIGINAL XU AND ZHANG REGRESSION EQUATIONS in our February 2013 report (Ehasz and Bowles 2013) it was concluded that the HRR (DUKe 2013) breach hydrograph for the: Jocassee Dam iS a realistic but conservative breach hydrograph that has good defendability based on the following:
In summary, Dr. Xu demonstrated the overall validity of his' evaluation, of the case history, data from all sources, including China,* and that good. backup information exists, although, for some Chinese case histories access to this information is restricted. For the Chinese Case histories this conclusion is based on the detailed information that Dr. Xu provided from the data. sources
: 1) the validity of the Xu and Zhang (2009) method;2) the conservative nature of the median brec aaeter estimates:
  .of failure analyses and records, which he accessed during the detailed .review that we.
: 3) a piping failure mode initiating in thel jjjj(I 4), the deposition of rockfill immediately below~the dam;5). the low erosion category of the rockfill material; and 6) the various characteristics of a modern dam that were included in the design and.construction of the Jocassee Dam.The original Xu and Zhang regression methodology and its previous implementation to Jocassee Dam are described in Appendix B. This appendix provides background for Section 6.where we address the questions raised by the FERC .and the NRC. It also provides background for section 7 where we describe the implementation of a revised version of the Xu and Zhang equations in a sensitivity analysis, which provides support for the breach hydrograph submitted'in the Hydrologic Reevaluation Report (HRR) to the NRC .by Duke on March 12, 2013 (Duke 2013).Section B.2 Summarizes the breach parameters and control Variables in the Xu and Zhang (2009) regression equations.
conducted with him over" a four-day period. Our detailed evaluation of all case histories is summarized in Section 6.3 and notes for specific case histories are presented in Appendix D. In addition, based on our detailed review (see section 6.3), we found that in a majority of-the cases a valid assessment of the case histories was performed by Xu and Zhang .(2009) as the P A 6, 19r
section B.3 discusses the case histories that were used to develop these equations and B.4 summarizes the regression equations, including their confidence limits. The implementation of the original Xu and Zhang (2009) methodology for the Jocassee Dam is described in Section B.5 and details of the use of the failure time estimate in the HEC-RAS model are discuss~l in Section B.6.P AG6E 15'
'VJI5 517 l~tw mlllVID1la
*V. -IrWIrn4I55
*V*4l**.'.*d*ll¥ Hl~ W ,..r I [I LI.IIl.J U VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 6.0 REVIEW AND REVISION OF XU AND ZHANG REGRESSION EQUATIONS 6.1 Approach to Review and Revision The FERC and NRC questions about the use of the Xu and Zhang (2009) methodology are summarized in Section 2.2 and are repeated here: 1) Precedence
-where has use of the Xu and Zhang (2009) methodology been accepted?2) Chinese case histories  
-about 43% of the dlam failure case histories on which the Xu arnd Zhang (2009) methodology is based are for Chinese dams for which little information is available in :the US.3) Representation of case histories for roclcflll and other low erodibility dams -the data set of dams used by Xu and Zhang (2009)to develop the regression equations has only three dams that are considered large (i.e. > 15 meters high) embankment dams with low erodibility and both of these dlams are all outside of the US.4) Use of the Briaud erosion categories
-how Were the erosion categories developed by Briaud (2008) applied in developing the Xu and Zhang (2009) methodology and are they applicable tO dam breach?5). Breach time definition,-
the definition of time to failure used by Xu and Zhang (2009), includes at least part' of the breach initiation phase in addition to the breach formation process unlike other regression methods that include only the breach formation process.To respond to these questions raised by the regulatory agencies we arranged for the primary author of the Xu and Zhang,(2009) technical paper to meet with us in the Denver Offices of URS during the period, November 7 -10, 2013. Those in attendance were Dr. Yao Xu of the China Institute of Water Resources and Hydropower Research, Dr. David Bowles with RAC Engineers& Economists and, Utah ,State University, Professor Jean-Louis Briaud with Texas A&M University, Joseph Ehasz with URS, and Adam Johnson from Duke Energy. On the morning of Friday November 8, Dr. Xu and Professor Briaud independently met with Tony Wah!, Bruce Feinberg and Dan Osmun of the Bureau of* Reclamation (Reclamation) at Reclamation's Hydraulics Laboratory in the Federal Center near Denver. This meeting was in response to Tony Wahr's request to meet with Dr. Xu-during his Visit to the US to discuss his questions regarding the Xu and Zhang (2009) methodology.
The four-day working session was divided into two parts: first discussions of the agency questions and. second a detailed case-by-case ,review of the 75 case histories that were used to develop the original Xu and Zhang (2009) regression equations.
The ultimate objective was to make appropriate changes to the Xu and Zhang (2009) case histories data set to address the agency questions and any other issues identified during our review so that Dr. Xu could develop revised regression equations.
P A GE 16
~VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM A summary of our discussions with Dr. Xu and Professor Briaud for each of the questions raised by the FERC and NRC and for some additional issues that were identified during these discussions is presented in Section 6.2. 'Specifically, these additional issues, which are discussed in Section 6.2.6 -6.2.8, were'as'follows:
: 1) Erosion category assigned to dams with corewalls anid concrete-faced rockflll dams 2) Differences in values of breach parameters and control variable in other sources, especially Froehlich
(!995a and'b and 2008) and WahI (1998)3) Inconsistencies between peak br~each flows~and breach development times The changes made to the data set of case histories are summarized in Section 6.3 and detailed in Appendix D. The revised regression equations are presented in section 6.4 and their test implementation for Teton Dam is discussed in Section 6.5. Their implementation for Jocassee Dam as a sensitivity study to evaluate the HR R hydrograph is presented in Section 7.6.2, Summary of Review Findings 6.2.1 Precedence In the U.S. dam safety community the acceptance of new methodologies often comes through adoption by the rniajor government dam, owners ,and regulatory ,agencies.
These agencies include the US Army Corps of Engineers (USACE) and the Bureau of Reclamation as major government datm owners and the FERC as the federal regulator for hydropower dams. As with any new methodology it takes time for it to become accepted into practice and for precedence to be established.
From'this perspective the Xu and Zhang (2009) methodology is st~i quite new.In, the case of the Xu and Zhang (2009) methodology, the questions raised by the FERC and the NRC must be addressed as part of the process if this methodology is to become more widely accepted.
Addressing these questions is the purpose of this section of the report.The inclusion Of erodibirity in the Xu and Zhang (2009) regression methodology is widely recognized
*as a Significant advantage over other breach parameter estimation regression analysis methodologies.
In fact Xu and Zhang (2009) demonstrated that erodibility is the single most important control variable in Ipredicting all five breach parameters.
Such a significant advantage justifies a careful evaluation of the Xu and Zhang (2009) methodologyto0 see if it can be more rapidly put to use in the profession.
H i i .wp i i l .... ..........
El * *~~* l 5lll'*t~tZltl*
* 5.. .a E U .* t n ., *.a-. *- -' VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSUE DAM Three uses of the Xu and Zhang (2009) methodology have been identified, as follows: 1) In developing a Simplified risk assessment procedure for small reservoirs for the equivalent of the dam safety regulator 2 in England and Wales [the Environment Agency and the Department for Environment, Food and Rural Affairs (Defra)], HR Wallingford (2014) evaluated the Xu and Zhang (2009) methodology for estimating peak breach flows. In' their comparative study they concluded'that the Froehlich (1995a) and Xu and Zhang (2009) approaches both 'yield "conservative, estimates of peak breach flow for highly erodible embankment dams and that the physically-based HR BREACH model (Mohamed 2002) and the simplified AREBA model (HR Wallingford 2012) provide more realistic estimates.
: 2) The Xu and Zhang (2009) methodology included in the breach parameter methodologies that are available in the USACE HEC-RAS computer model, which Is widely used in the US for dam breach modeling.
It Was also included in a discussion of"Hydraulic modeling aspects that are unique to performing a .dam break analysis" by Brunner (2011), who is the USACE Hydrologic Engineering Center (HEC) technical lead for the HEC-RAS model. In both cases a caution is given that "the data Xu and Zhang used in the development of the equation for breach development time includes more of the initial erosion Pieriod and post erosion period than what is generally used in HEC-RAS for the 'critical breach development time" (Brunner 2011). In addition it is stated that-".. because of this fact, the XU and Zhang equation .for brea'ch development time should not be used in HEC-RAS" (Brunner 2011). However, in a PersOnal Communication (December 2013) with Dr. Brunner he agreed that it was. reasonable to*iteratively change the breach progression relationship and the values orifice and weir coefficients in the manner described in Section B.6 for Jocassee Dam when using failure time estimates based on Xu and Zhang '(2009). He also expressed interest in replacing the original Xu and Zhang (2009) regression relationships in HEC-RAS with the revised relationShips that are described S ection 6.14.3) We understand from Dr. Xu that the Xu and Zhang (2009) methodology is being applied by government agencies in China.6.2.2 Chinese Case Histories.About 43% or' 32 of the 75 dam failure case histories on Which the Xu and Zhang (2009)methodology is based are for Chinese dams. None of these case histories are included in the Wahl (1998) data base of case histories, although :that data base' may be due. for anupdlate and if one is undertaken it would seem beneficial to include Case histories from China.2, In England and Walesthe Environment Agency ,is responsible.
for enforcement of reservoir safety requirements for specific reservoirs "in the: interest of safety" that 'are determined by Panel Engineers who .are appointed by the Secretary for State. Defra has a policy role for deveiopmnent of reservoir safety legislation and guidance.P A 6E 18


In'urmr~nin-wannwu ,rrum puDIIc asciosuiweper "U (~i.C [LJWu(O)~~JRS In association withRC VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM-SIn discussing the quality of data for the Chinese case histories, Dr. Xu stated that he felt that the available information was similar, in quality to what he had examined in his research for: case histories from. the US' and. some other countries.
*'u...*.*.o=...*.*=.u..==.._1....=!.=,,,,=
In at least .two cases-detailed failure investigations reports have been prepared for the Banqiao and. Shimantan failures.
vvvw=  -*j
Dr. Xu referenced a report by Ru and Niu (2001), which contains information on many Chinese dam breaches.
                                          ,,,,uoo,*,=,uo, ,*,,uouu                                  u,=o ,.u
This report, is readily available outside of China. He also had access to a detailed database on dam failure Case histories, but this is not available outside China. However, Dr. Xu made extensive reference to this data base during-our detailed evaluation of the case, histories that were used as a basis for developing the Xu and Zhang (20.09) regression methodology (see Section 6.3)..Dr. Xu also described a screening process that he performed before using the case history data from China and other countries in his regression analysis.
                                                                        ,,uuo uuuo,*, uo*,.,,.*u,,= I--- --
Any case histories .where .significant Concerns existed about the quality of the available data were omitted. It should be noted that the Chinese data used by Xu include some more recent-dam breaches than used by others, such as Froehlich (1995 and We also enquired about the quality of construction, for the Chinese .case history, dams. Dr. XU indicated that dams designed and constructed before 1977 were not up to modern standards, and that modern construction methods and ,equipment were not used. Dams. constructed 1977 can be considered to meet modern standards.
n-- .= ...*u.u.
The .significance for Chinese case is first that there are more of them because of the poorer standards prior to 1977.Secondly, the poorer construction, and in particular the poorer compaction .of Chinese.embankment dams constructed prior to 1977, would be expected to result in a more erodible-dam once a breach process has initiated.
VAIJDATION OF HRR BREACH1 HYDROGRAPH'FOR JOCASSEE DAM basis for the values assigned to the control variables-and breach parameters that were used in the regression analysis. The exceptions,, which resulted in our making some adjustments to the assigned values, are discussed in Section.6.3 and documented in Appendix D. The revised values were used in the revised regression analysis that is presented in Section 6.4 and used in a sensitivity analysis on the HRR breach hydrograph that is presented in Section 7.
Unlike most other regression methods, for estimating breach parameters, thel XU and Zhang (2009) approach includes the erosion category as a means of accounting for the more erodible characteristic of the Chinese dams that were constructed prior to 1977. The .approach adopted' by Xu and Zhang (2009) to account for the effect of poor construction in the development-of their regression equations is summarized in Section .6.2.4. We also make reference to this .approach in. Section 6.3.2, in which we summarize the critical review that we. performed of the entire Xu and Zhang (2009) data set, including all Chinese case histories.
6.2.3 Representation of Case Histories for Rockfill and Low Erodibility Dams The small number of case histories' for rockfill dams that are classified in the low erosion category is a reality :that is likely due to the intrinsic safety' of rckfill dams in general. Another limitation is the lack of case histories of the failure for large .(high) dams with a reservoir capacity similar to Lake Jocassee. This can be clearly seen in Figures B~la and b. However, when volume is plotted logarithmically in Figure EB*lb, which corresponds to its representation in the.
In summary, Dr. Xu demonstrated the overall validity of his' evaluation, of the case history, data from all sources, including and that good. backup information exists, although, for some Chinese case histories access to this information is restricted.
multiplicative regression equations, the extrapolation from the range of case histories to Lake Jocassee for The reservoir volume above the breach invert can be seen to be relatively less significant.
For the Chinese Case histories this conclusion is based on the detailed information that Dr. Xu provided from the data. sources.of failure analyses and records, which he accessed during the detailed .review that we.conducted with him over" a four-day period. Our detailed evaluation of all case histories is summarized in Section 6.3 and notes for specific case histories are presented in Appendix D. In addition, based on our detailed review (see section 6.3), we found that in a majority of-the cases a valid assessment of the case histories was performed by Xu and Zhang .(2009) as the P A 6, 19r
These limitations apply to all breach parameter regression methodologies. However, Xu and Zhang (2009) offset, these limitations to some extent by including case histories from China for the Danghe and Gouhou large rockfill dams. In addition, their inclusion of the Briaud (2008) erosion categor'ies as a control variable was another innovation that was intended to account for the important effects that differences in the erodibil ity of materials in embankment dams have on breach parameters. Still regression equations are limited in. their ability to explain all the variability' that exists in the available case history data. ,Incontrast physically-based approaches are less limited than regression equations because they introduCe a ,representation of the physics of the erosion, instability and hydraulics phenomena that determine breach processes,.
,,uuo u,=o ,.u ,... n .= ...vvvw=  I--- -- -- --VAIJDATION OF HRR BREACH1 HYDROGRAPH'FOR JOCASSEE DAM basis for the values assigned to the control variables-and breach parameters that were used in the regression analysis.
The exceptions,, which resulted in our making some adjustments to the assigned values, are discussed in Section.6.3 and documented in Appendix D. The revised values were used in the revised regression analysis that is presented in Section 6.4 and used in a sensitivity analysis on the HRR breach hydrograph that is presented in Section 7.6.2.3 Representation of Case Histories for Rockfill and Low Erodibility Dams The small number of case histories' for rockfill dams that are classified in the low erosion category is a reality :that is likely due to the intrinsic safety' of rckfill dams in general. Another limitation is the lack of case histories of the failure for large .(high) dams with a reservoir capacity similar to Lake Jocassee.
This can be clearly seen in Figures B~la and b. However, when volume is plotted logarithmically in Figure which corresponds to its representation in the.multiplicative regression equations, the extrapolation from the range of case histories to Lake Jocassee for The reservoir volume above the breach invert can be seen to be relatively less significant.
These limitations apply to all breach parameter regression methodologies.
However, Xu and Zhang (2009) offset, these limitations to some extent by including case histories from China for the Danghe and Gouhou large rockfill dams. In addition, their inclusion of the Briaud (2008)erosion categor'ies as a control variable was another innovation that was intended to account for the important effects that differences in the erodibil ity of materials in embankment dams have on breach parameters.
Still regression equations are limited in. their ability to explain all the variability' that exists in the available case history data. ,In contrast physically-based approaches are less limited than regression equations because they introduCe a ,representation of the physics of the erosion, instability and hydraulics phenomena that determine breach processes,.
However, these approaches must be used in an appropriate manner that accounts for their own limitations and the resulting uncertainties in predictions when used to develop breach hydrographs.
However, these approaches must be used in an appropriate manner that accounts for their own limitations and the resulting uncertainties in predictions when used to develop breach hydrographs.
6.2.4 Use of the Briaud Erosion Categories We asked Dr. Xu what information he used as the basis for the assignment~.of erosion categories to the case histories used in developing his regression equations.
6.2.4 Use of the Briaud Erosion Categories We asked Dr. Xu what information he used as the basis for the assignment~.of erosion categories to the case histories used in developing his regression equations. He described two-step process. In his first step the soil type within the dam was used to assign a range of erosion categories as low erodibility (LE) to medium erodibility (ME) for rockfill and clay and ME to high erodibility (HE) for silt and sand.: The second step was to evaluate the construction quality, particularly compaction effort, based mostly' on the period of construction to determine which end of the range of erosion categories to assign. For example, the period 1950 to 1976 in China, would be Characterized by .low compaction using human powered tampers, and after about 1977 in China high compaction would be achieved using machine rollers. Other useful P AG E 20
He described two-step process. In his first step the soil type within the dam was used to assign a range of erosion categories as low erodibility (LE) to medium erodibility (ME) for rockfill and clay and ME to high erodibility (HE) for silt and sand.: The second step was to evaluate the construction quality, particularly compaction effort, based mostly' on the period of construction to determine which end of the range of erosion categories to assign. For example, the period 1950 to 1976 in China, would be Characterized by .low compaction using human powered tampers, and after about 1977 in China high compaction would be achieved using machine rollers. Other useful P AG E 20  
..... ................. .. ................................
W ' .I f II S I socainwt VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM pieces of information such as dam cross-sectional
:geometry, materials and slope surface protection were used as supplementary information for assigning the dam erOsion categories.
Professor Briaud's independent review confirmed the appropriateness of using *his erosion categories for dam breach parameter estimnation in the Xu and Zhang (2009) methodology.
His review is summarized in Section 4 and detailed in *Appendix A.The two-step approach dlescribed above is consistent with the Briaud (2008) erosion categorization approach as summarized below. The dam erosion categories high, medium or low are described by Xu and Zhang (2009) as a relative measure based on !the embankment material' compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information.
Briaud (2008) found that the rate of erosion can be very different for different soils that are classified in different erosion resistance categories.
Specifically, rockfill and clay are often associated
'with. medium to low erosion category while sand and silt are often associated with high to medium erosion category.
Hence, material compositions are considered as, a primary basis for classifying dam 'erosion category.
In addition, compaction conditions also play an important role in determining the dam erosion category, especially for dams constructed from fine soils. Briaud (2008) reported that the erosion resistance increases With compaction effort and that the effect is more significant for some soils with high fines contents.
It was also indicated by Wan and Fell (2004) that ther erosion rate index of a soil is inflUenced strongly by the degree of compaction.
As described by Dr. Xu, thle year Of construction and the associated compaction methods were therefore important information for judging the compaction condition of the case history damns, and hence the* assignment of dam erosion-categories.


====6.2.5 Breach====
*-*m*ir*      * ..... =*. * ................. *=* .. . ...............................
Time Definition As is well recognized, the predicted breach from Xu and Zhang (2009) are significantly longer than those obtained*
II S W            '    . I f Isocainwt VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM pieces of information such as dam cross-sectional :geometry, materials and slope surface protection were used as supplementary information for assigning the dam erOsion categories.
from other methodologies such as Froehlich
Professor Briaud's independent review confirmed the appropriateness of using *his erosion categories for dam breach parameter estimnation in the Xu and Zhang (2009) methodology. His review is summarized in Section 4 and detailed in *AppendixA.
'(1 995b and 2008). Xu and Zhang (2009) based their definition of breach development time on the definition by Wahl (2004), which states that development begins when a breach has reached the point at which the volume of the reservoir is compromised and failure becomes imminent" and bends When the breach reaches its final size."; By 2013 WahI (2013) revised his breach time definition to be consistent with Froehtich (1995b 'and 2008). The difference between the definitions of failure time used in the original Xu and Zhang (2009) methodology based on Wahl (2004) and by-others is discussed in detail in S ection B.6.We found that of the 30 case histories that were :used by Xu and Zhang (2009) to establish their regression equations for breach development time, only five also appear in the Froehlich (2008)data set. 'Of these five, three have the same values for breach development times in both data sets but for two (Apishapa and Teton dams) the Xu and Zhang (2009) values are just over three times the Froehlich (2008) valueS. In our detailed review of the case history data (see Section P A 6 E 22.  
The two-step approach dlescribed above is consistent with the Briaud (2008) erosion categorization approach as summarized below. The dam erosion categories high, medium or low are described by Xu and Zhang (2009) as a relative measure based on !the embankment material'compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information. Briaud (2008) found that the rate of erosion can be very different for different soils that are classified in different erosion resistance categories. Specifically, rockfill and clay are often associated 'with. medium to low erosion category while sand and silt are often associated with high to medium erosion category. Hence, material compositions are considered as, a primary basis for classifying *the dam 'erosion category. In addition, compaction conditions also play an important role in determining the dam erosion category, especially for dams constructed from fine soils. Briaud (2008) reported that the erosion resistance increases With compaction effort and that the effect is more significant for some soils with high fines contents. It was also indicated by Wan and Fell (2004) that ther erosion rate index of a soil is inflUenced strongly by the degree of compaction. As described by Dr. Xu, thle year Of construction and the associated compaction methods were therefore important information for judging the compaction condition of the case history damns, and hence the*assignment of dam erosion-categories.
.L: .... ..... ..........,.r .-lUI mffpigIp(iUI aIgaIIa U -F-"-.-.- --VALIDATION OF HRR BREACH HYDROGRAPH FOR JOcASSEE DAM 6.3) we addressed this inconsistency by changing these values of breach development timesto match the Froehlich (19 95b and 2008) definition based on avail able information.
6.2.5 Breach Time Definition As is well recognized, the predicted breach *times' from Xu and Zhang (2009) are significantly longer than those obtained*from other methodologies such as Froehlich '(1 995b and 2008). Xu and Zhang (2009) based their definition of breach development time on the definition by Wahl (2004), which states that *breach development begins when a breach has reached the point at which the volume of the reservoir is compromised and failure becomes imminent" and bends When the breach reaches its final size."; By 2013 WahI (2013) revised his breach time definition to be consistent with Froehtich (1995b 'and 2008). The difference between the definitions of failure time used in the original Xu and Zhang (2009) methodology based on Wahl (2004) and by-others is discussed in detail in S ection B.6.
In our detailed review we found that in a few cases lower erosion categories had been assigned to damn breaches that had long observed failure times when all other available information about the damn, the materials from it was constructed, and the quality of construction pointed to a higher erosion category.
We found that of the 30 case histories that were :used by Xu and Zhang (2009) to establish their regression equations for breach development time, only five also appear in the Froehlich (2008) data set. 'Of these five, three have the same values for breach development times in both data sets but for two (Apishapa and Teton dams) the Xu and Zhang (2009) values are just over three times the Froehlich (2008) valueS. In our detailed review of the case history data (see Section P A 6 E 22.
In our detailed review of the case history data we changed these to a higher erosion category for developing the revised regression equations that are sensiti vity studies presented in Section 7, since in applyin~g the regressioni equations one'would haVe no basis for this type of adjustment of the erosion category.6.2.6 ErOsion Category Assigned to Dams with Corewalls and Concrete Faced Rockfill Dams In our detailed review of the case history data, we found that the term "corewall'" had been used for some dlams that had a claY core but not core wall constructed of concrete, masonryor steel to distinguish them from homogenous fill dams with no clay core. This was apparently a misunderstanding about the use of terminology in English and we corrected this in assigning the dam type control variable in the data set that was Used for developing the revised Xu and Zhang equations.
 
In some case we found dams thatl were assigned a. low erosion category as an indirect means of accounting for the throttling effects on breac~h development in embankment dams with a concrete core wall or for concrete-faced rockfill dams (CFRD). While this approach has some merit, it was judged that the breach parameters for embankment dams with a concrete corewall or CFRDs would not be representative of 'the erosional process' in low erodibility embankment dams in general,, and so we excluded dams with' a core wall or a concrete face from-the data set that was used to develop the revised Xu and Zhang reg ression equation s (see Section 6.4).6.2.7 Differences in Values' of Breach Parameters and Control Variable in Other Sources, All values of the control variables and br'each parameters in the Xu and Zhang (2009) data set were compared with those found in other sources,, including the following:
. .... ..... L:                          .. ........ ,.r . -lUI mffpigIp(iUI aIgaIIa JIU*JIIrM UIJ5CI,J*UIB- F-"-.-.-
* WahI (1998) "best reliable information"*- Froehlich (1 995a and b and 2008), 'VonThun and Gillette (1990)* Costa (1985)*- Waider and O'Conner (1997)* MacDonald and Langridge-Monopolis (1984)P A, Ge 22 VALIDATiON OF HRR'BREACi' HYDRoGRAPH FOR JOCA SSEE DAM Preference Was generally given to adopting values contained in the first two sources, although where available additional sources were consulted ,to verifY or change Xu and Zhang (2009)data set values. These additional sources included Singh (1996) and various internet sources that are referenced in Appendix D. The changed values were used to develop the revised Xu and Zhang regression equations that were used for the Sensitivity studies that are Presented in Section 7.6.2.8 Inconsistencies between Peak Breach Flows and Breach Development Times An inconsistency was identified in many case histories between the peak, breach flowS, breach development times and the reservoir volume above the, breach bottom at the time of failure.The inconsistency exists for many case histories in the Wahi (1998) data base and in the Froehlich (1995a and b and 2008) data as well as in the Xu and Zhang (2009) data. The inconsistency was identified by assuming that the breach outflow hydrograph has a general triangular shape with the base of the triangle representing the breach development time, the height the peak outflow rate, and the area of the triangle the volume of reservoir Contents above the breach bottom elevation.
DPI*    -,*U - -
Under this assumption an approximate breach formation time can be calculated from simple geometry as follows: T = 2Vw/Qp (6)in which: T = Breach development time Vw Volume Of reservoir contents above breach invert at the time of failure Qp= Peak breach flOW rate On the basis that. the observed Values of Vw and Qp can generally be obtained with greater accuracy than the observed value of T, we compared the values of T calculated using .Equation 6 with the observed values in the .case histories:
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOcASSEE DAM 6.3) we addressed this inconsistency by changing these values of breach development timesto match the Froehlich (19 95b and 2008) definition based on avail able information.
used by Xu and Zhang (2009) and those in Wahl (1998)r and Froehlich (1995a and b and 2008) and found significant differences, To avoid changing the case history values Of T in the widely accepted Wahl (1998) and Froehlich (1995a and b and 2008) data sets, we used those values to develop the revised Xu and Zhang regression equations that were used in the sensitivity, studies. However, we found, not unexpectedly, that this inconsistency resurfaces, when a similar comparison, is madea between predicted values of the breach development time and those obtained from Equation 6. We discuss this issue further in Section 7.2 and the approach that we have developed to address it.P A 6 E .23 C.z---.;
In our detailed review we found that in a few cases lower erosion categories had been assigned to damn breaches that had long observed failure times when all other available information about the damn, the materials from *Ahich it was constructed, and the quality of construction pointed to a higher erosion category. In our detailed review of the case history data we changed these to a higher erosion category for developing the revised regression equations that are *the sensiti vity studies presented in Section 7, since in applyin~g the regressioni equations one'would haVe no basis for this type of adjustment of the erosion category.
....., ..... [;;,--.= v' -;, .,,, puum. , I;.ir;burw per w' t..iN £.J~u(UJ VALIDATION OF HRR BREACHI HYDROGRAPH FOR JOCASSEE DAM i ill.i p 6.3 Summary of Revisions to Case History Data Set 6.3.1 Approach During the Denver meetings the group questioned Dr. Xu about each of the 75 case histories that were used to develop the original Xu and Zhang (2009) regression equations.
6.2.6 ErOsion Category Assigned to Dams with Corewalls and Concrete Faced Rockfill Dams In our detailed review of the case history data, we found that the term "corewall'" had been used for some dlams that had a claY core but not core wall constructed of concrete, masonryor steel to distinguish them from homogenous fill dams with no clay core. This was apparently a misunderstanding about the use of terminology in English and we corrected this in assigning the dam type control variable in the data set that was Used for developing the revised Xu and Zhang equations.
All values of the control variables and the breach parameters for the case histories were discussed and reviewed and notes were recorded in a spreadsheet (see Appendix D) during the meeting and to record the results of further scrutiny following the meeting. Professor Briaud assisted in the detailed erosion category review and this resulted in changes to several case histories.
In some case we found dams thatl were assigned a. low erosion category as an indirect means of accounting for the throttling effects on breac~h development in embankment dams with a concrete core wall or for concrete-faced rockfill dams (CFRD). While this approach has some merit, it was judged that the breach parameters for embankment dams with a concrete corewall or CFRDs would not be representative of 'the erosional process' in low erodibility embankment dams in general,, and so we excluded dams with' a core wall or a concrete face from-the data set that was used to develop the revised Xu and Zhang reg ression equation s (see Section 6.4).
6.2.7      Differences in Values' of Breach Parameters and Control Variable in Other Sources, All values of the control variables and br'each parameters in the Xu and Zhang (2009) data set were compared with those found in other sources,, including the following:
* WahI (1998) "best reliable information"
              *- Froehlich (1 995a and b and 2008)
              , 'VonThun and Gillette (1990)
* Costa (1985)
              *- Waider and O'Conner (1997)
* MacDonald and Langridge-Monopolis (1984)
P A,Ge 22
 
                                  *v,.=*,**. VALIDATiON OF HRR'BREACi' HYDRoGRAPH FOR JOCA SSEE DAM Preference Was generally given to adopting values contained in the first two sources, although where available additional sources were consulted ,to verifY or change Xu and Zhang (2009) data set values. These additional sources included Singh (1996) and various internet sources that are referenced in Appendix D. The changed values were used to develop the revised Xu and Zhang regression equations that were used for the Sensitivity studies that are Presented in Section 7.
6.2.8  Inconsistencies between Peak Breach Flows and Breach Development Times An inconsistency was identified in many case histories between the peak, breach flowS, breach development times and the reservoir volume above the, breach bottom at the time of failure.
The inconsistency exists for many case histories in the Wahi (1998) data base and in the Froehlich (1995a and b and 2008) data as well as in the Xu and Zhang (2009) data. The inconsistency was identified by assuming that the breach outflow hydrograph has a general triangular shape with the base of the triangle representing the breach development time, the height the peak outflow rate, and the area of the triangle the volume of reservoir Contents above the breach bottom elevation. Under this assumption an approximate breach formation time can be calculated from simple geometry as follows:
T = 2Vw/Qp                                                                    (6) in which:
T              =              Breach development time Vw                        Volume Of reservoir contents above breach invert at the time of failure Qp=                        Peak breach flOW rate On the basis that. the observed Values of Vw and Qp can generally be obtained with greater accuracy than the observed value of T, we compared the values of T calculated using .Equation 6 with the observed values in the .case histories: used by Xu and Zhang (2009) and those in Wahl (1998)r and Froehlich (1995a and b and 2008) and found significant differences, To avoid changing the case history values Of T in the widely accepted Wahl (1998) and Froehlich (1995a and b and 2008) data sets, we used those values to develop the revised Xu and Zhang regression equations that were used in the sensitivity, studies. However, we found, not unexpectedly, that this inconsistency resurfaces, when a similar comparison, is madea between predicted values of the breach development time and those obtained from Equation 6. We discuss this issue further in Section 7.2 and the approach that we have developed to address it.
P A 6 E .23
 
C.z---.;  C'.3-'-.*;.. , .....
                        .....  [;;,--.=      v' - ;;;;,u*      ;, .,,, puum. , I;.ir;burw per w' t..iN £.J~u(UJ VALIDATION OF HRR BREACHI HYDROGRAPH FOR JOCASSEE DAM i ill.i                                                                   p 6.3     Summary of Revisions to Case History Data Set 6.3.1   Approach During the Denver meetings the group questioned Dr. Xu about each of the 75 case histories that were used to develop the original Xu and Zhang (2009) regression equations. All values of the control variables and the breach parameters for the case histories were discussed and reviewed and notes were recorded in a spreadsheet (see Appendix D) during the meeting and to record the results of further scrutiny following the meeting. Professor Briaud assisted in the detailed erosion category review and this resulted in changes to several case histories.
In addition, all values of the control variables and breach parameters in the Xu and Zhang (2009) data set were compared with those in other sources that are listed in Section 6.2.7 and adjusted as appropriate.
In addition, all values of the control variables and breach parameters in the Xu and Zhang (2009) data set were compared with those in other sources that are listed in Section 6.2.7 and adjusted as appropriate.
6.3.2    Summary of Xu and Zhang (2009) Data Set Revisions used in the Sensitivity Studies A summary of the types of changes that were made were to the Xu and Zhang (2009) data set is as follows:
* Changed breach development times to the Froehlich (1995b and 2008) definition of breach developm ent time.
* Changed the values of other variables where they were inconsistent with the Wahl (1998) and Froehlich (1995a and b and 2008) data with consideration given to other reliable information that was found in various other sources m entioned in Section 6.2.
        *Changed assigned erosion categories to include the consideration that compaction associated with construction practices in the US and other developed countries (not China) improved for earthfill dams after about 1950 and for rockfill dams after about 1965. This is similar to the consideration used by Xu and Zhang (2009) for Chinese case histories before and after 1977.
* Changed to higher erosion categories cases where lower erosion categories had been assigned because of long observed failure times but where all other available information about the dam, the materials from which it was constructed, and the quality of construction pointed to a higher erosion category.
* Eliminated case histories for concrete-faced dams and dams with core walls or cut-offs (discussed below).
The above changes were made to improve the quality of the data used in the revised regression equations and to achieve consistency with the commonly-used Froehlich (1995b and 2008) definition of breach development time. In principle this definition was seen as a way to assign the duration of the breach hydrograph that is commonly developed using the HEC-RAS software; but as demonstrated in Section 7.2, it was found that another step was necessary to P A GE 24
L...... :.        ~          ~      - u,,~mn,,rjprx* ,rflm
                                                              ..    ...
* Hv ,i,~i~in~iir~
nairuiu~ *.  *
* v ~51r
: v. Ill
* i:i-i#    *. .AqflIflI
                                                                                                            * *
* Ti  v KE S                  association with i*
In                  C~EII VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA$$EE DAM estimate a breach development time that is consistent with the predicted values of peak breach flow and the reservoir volume above the breach bottom at the time of the breach. Overall the numbers of changes to US, China and other country case histories in the .original Xu and Zhang (2009) data set were as follows:
* Reservoir capacity: 3 US changes
* Dam erosion categories: 10 changes comprising 4 US, 5 China and 1 Brazil
* Failure modes: 3 US changes
* Volume of water above breach invert: 5 US changes
* Depth of water above breach invert: 2 US changes
* Breach height: 2-US changes
* Breach average width: 4 US changes
* Breach side slope: 2 US changes
* Breach failure time: 9 changes comprising 6 US, 2 China and I Brazil In addition to these changes, twenty out of the 75 case histories used by Xu and Zhang (2009) were eliminated for the following reasons:
* Concrete-faced dams: 5 total, I Argentina (Frias), I China (Gouhou), 3 USA (Davis Reservoir, Horse Creek, Swift)
* Dams with core walls or cut offs: 8 total, I China (Danghe), 1 UK (Coedty), 6 USA (Castlewood, Elk City, Lower Otay, Lynde Brook, Winston, Wilkinson Lake)
* Lack of reliable information: 6 total, 2 China (Niujiaoyu, Huqitang), 4 USA (Potato Hill Lake, Trial Lake, Upper Pond, Otter Lak e)
* Not representative due a large volume reservoir with a small height dam that resulted in a long breach development time and a very wide breach: I US A (Hatfield)
The concrete-faced dams and dams with core walls were removed because their breach characteristics would not be representative of the erosional process for breaching of embankment dams in general. Specifically the concrete membrane would be expected to resist breach development and to have a throttling effect on breach development. Xu and Zhang (2009) assigned a low erosion category as an indirect means of accounting for these effects of a core wall or concrete face but this was judged to. bias the data set.
Given more time it is possible that additional information may have been obtained for some cases that were eliminated due to a lack of reliable information. Also it is possible that some accepted US and other developed country case histories, which were not included by Xu and Zhang (2009), could have been added to the dat a set.
P AGE 25


====6.3.2 Summary====
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA4$$EE DAM Lastly, and despite the Scrutiny imposed on the data ,from China :during our meetings, the Chinese case histories were omitted from the data set that was used: to develop the revised Xu and Zhang equations used in the Sensitivity studies. This *conservative step was taken to increase confidence in the revised Xu and Zhang regression equations by avoiding the potential criticism that we had only limited and indireCt access to the original references for the Chinese case histories. However, this step further reduced the total number of case histories from 55 to 27.
of Xu and Zhang (2009) Data Set Revisions used in the Sensitivity Studies A summary of the types of changes that were made were to the Xu and Zhang (2009) data set is as follows:* Changed breach development times to the Froehlich (1995b and 2008) definition of breach developm ent time.* Changed the values of other variables where they were inconsistent with the Wahl (1998) and Froehlich (1995a and b and 2008) data with consideration given to other reliable information that was found in various other sources m entioned in Section 6.2.*Changed assigned erosion categories to include the consideration that compaction associated with construction practices in the US and other developed countries (not China) improved for earthfill dams after about 1950 and for rockfill dams after about 1965. This is similar to the consideration used by Xu and Zhang (2009) for Chinese case histories before and after 1977.* Changed to higher erosion categories cases where lower erosion categories had been assigned because of long observed failure times but where all other available information about the dam, the materials from which it was constructed, and the quality of construction pointed to a higher erosion category.* Eliminated case histories for concrete-faced dams and dams with core walls or cut-offs (discussed below).The above changes were made to improve the quality of the data used in the revised regression equations and to achieve consistency with the commonly-used Froehlich (1995b and 2008)definition of breach development time. In principle this definition was seen as a way to assign the duration of the breach hydrograph that is commonly developed using the HEC-RAS software; but as demonstrated in Section 7.2, it was found that another step was necessary to P A GE 24 L...... :. ~ ~ -u,,~mn,,rjprx ,rflm nairuiu~ ,i,~i~in~iir~
The numbers of case histories that Were used to estimate the revised best exact and best
~51r Ill i:i-i# Ti .AqflIflI* .. ... Hv *
*simplified *equations, respectively, are as listed below:
* v v. * * *
    . Breach depth (Hb): 23 and 23
* v K E S In association with C~EII VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA$$EE DAM estimate a breach development time that is consistent with the predicted values of peak breach flow and the reservoir volume above the breach bottom at the time of the breach. Overall the numbers of changes to US, China and other country case histories in the .original Xu and Zhang (2009) data set were as follows:* Reservoir capacity:
* Breach top width (Bt): 21 and 24
3 US changes* Dam erosion categories:
    . Average breach width (Bare): 22 and 24
10 changes comprising 4 US, 5 China and 1 Brazil* Failure modes: 3 US changes* Volume of water above breach invert: 5 US changes* Depth of water above breach invert: 2 US changes* Breach height: 2-US changes* Breach average width: 4 US changes* Breach side slope: 2 U S changes* Breach failure time: 9 changes comprising 6 US, 2 China and I Brazil In addition to these changes, twenty out of the 75 case histories used by Xu and Zhang (2009)were eliminated for the following reasons:* Concrete-faced dams: 5 total, I Argentina (Frias), I China (Gouhou), 3 USA (Davis Reservoir, Horse Creek, Swift)* Dams with core walls or cut offs: 8 total, I China (Danghe), 1 UK (Coedty), 6 USA (Castlewood, Elk City, Lower Otay, Lynde Brook, Winston, Wilkinson Lake)* Lack of reliable information:
* Peak outflow rate (Qp): 16 and 19
6 total, 2 China (Niujiaoyu, Huqitang), 4 USA (Potato Hill Lake, Trial Lake, Upper Pond, Otter Lak e)* Not representative due a large volume reservoir with a small height dam that resulted in a long breach development time and a very wide breach: I US A (Hatfield)
* Breach development~time or failure time (TO): 14 and 14 These are significantly fewer than for the original Xu and Zhang (2009). However, as can be seen from Figures 6.1a and b, they cover the same range as the original data set. Figures 6.1a and b are similar to Figures B~la and b. Figures 6.la and b show the :depth of water above breach invert, Hw, and volume of'water at the breach time, Vw,, on arithmetic-arithmetic and adithmetic-log axes, respectively, for the 75 case hitds           teoriginal Xu and Zhang (2009) data set and the 55 case histories in the revised data set. The 27 US or other country data remaining after the Chinese data are om itted can also be identified in these figures.
The concrete-faced dams and dams with core walls were removed because their breach characteristics would not be representative of the erosional process for breaching of embankment dams in general. Specifically the concrete membrane would be expected to resist breach development and to have a throttling effect on breach development.
The revised data set include three low erosion category case histories, 11 medium erosion categories and 13 high erosion categories. It includes seven overtopping failures and 20 seepage-erosion failures.
Xu and Zhang (2009) assigned a low erosion category as an indirect means of accounting for these effects of a core wall or concrete face but this was judged to. bias the data set.Given more time it is possible that additional information may have been obtained for some cases that were eliminated due to a lack of reliable information.
6.4       ReVised Regression Equations for use in the Sensitivity Study Dr. Xu personally developed revised regression equations for the best exact prediction using all five control variables. He also developed the best simplified prediction equations as those that gave the highest R2 dj as obtained through a stepw ise regression procedure (see Section B.4).
Also it is possible that some accepted US and other developed country case histories, which were not included by Xu and Zhang (2009), could have been added to the dat a set.P AGE 25 VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA4$$EE DAM Lastly, and despite the Scrutiny imposed on the data ,from China :during our meetings, the Chinese case histories were omitted from the data set that was used: to develop the revised Xu and Zhang equations used in the Sensitivity studies. This step was taken to increase confidence in the revised Xu and Zhang regression equations by avoiding the potential criticism that we had only limited and indireCt access to the original references for the Chinese case histories.
The revised Xu and Zhang regression equations were developed using the revised case histony data as described in Section 6.3. As eXplained in Section 6.3.2, the. Chinese case histories.
However, this step further reduced the total number of case histories from 55 to 27.The numbers of case histories that Were used to estimate the revised best exact and best*simplified  
*equations, respectively, are as listed below:.Breach depth (H b): 23 and 23* Breach top width (Bt): 21 and 24.Average breach width (Bare): 22 and 24* Peak outflow rate (Qp): 16 and 19* Breach development~time or failure time (TO): 14 and 14 These are significantly fewer than for the original Xu and Zhang (2009). However, as can be seen from Figures 6.1a and b, they cover the same range as the original data set. Figures 6.1a and b are similar to Figures B~la and b. Figures 6.la and b show the :depth of water above breach invert, Hw, and volume of'water at the breach time, Vw,, on arithmetic-arithmetic and adithmetic-log axes, respectively, for the 75 case hitds teoriginal Xu and Zhang (2009)data set and the 55 case histories in the revised data set. The 27 US or other country data remaining after the Chinese data are om itted can also be identified in these figures.The revised data set include three low erosion category case histories, 11 medium erosion categories and 13 high erosion categories.
It includes seven overtopping failures and 20 seepage-erosion failures.6.4 ReVised Regression Equations for use in the Sensitivity Study Dr. Xu personally developed revised regression equations for the best exact prediction using all five control variables.
He also developed the best simplified prediction equations as those that gave the highest R 2 dj as obtained through a stepw ise regression procedure (see Section B.4).The revised Xu and Zhang regression equations were developed using the revised case histony data as described in Section 6.3. As eXplained in Section 6.3.2, the. Chinese case histories.
were excluded from the revised regression equations that we used in the sensitivity study to evaluate the approprilateness of the HRR breach hydrograph.
were excluded from the revised regression equations that we used in the sensitivity study to evaluate the approprilateness of the HRR breach hydrograph.
P A 6 E 26,i VA UDA In~ OF HRR BREAO. HVMGRP FOA JOC4SSEE DAM OdIginal and Revised Ku and Zhang DataI 80 7O I.I.°: 0iI 0 I U*USA. OrWmn A Other IUjcuse. -Orignal X Clnr -Revised Other -Rlevise Xlocassee -Reid 00 400 60 800 1000*bu. .m WII, ab:e, nv~irt Vae (a 105mrol 1200 14100 a) scales Origlinal and Reie Ku and ThanI Data ItN NI I 70 18 I°4 0 140 1w°rO 10 0~.N x x,, *m I Clna -Or~lnalOter.- Orignal-OrtIgnal M ua.n Revised KiCasmee -Re~vised x 0.1 1 10 100*4. of ,,wemim hImwt Vw (a 1OS m3)b) ArIthmetic-logartthmic scales Figure 6.1. Depth of water above breach Invert vs. volume of water at the breach time for the original and revised Xu and Zhang case histories.
P A 6 E 26,i
P AG0E 27 JRhS InaoctonWtlLC VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM The coefficients for the revised regression equations are presented in Tables 6.1 and 6.2 for the best exact and best s implified prediction equations, respectively.
 
VA UDA In~OF HRR BREAO. HVMGRP                   FOAJOC4SSEE DAM OdIginal and Revised Ku and Zhang DataI 80 I
7O                                                                   U I.
I.°:                                                                           *USA. OrWmn A Other Oi*In.
IUjcuse. -Orignal X Clnr   - Revised Other - Rlevise Xlocassee -Reid 0iI0    00         400         60     800         1000     1200  14100
                              *bu. .m WII, ab:e, Iree* nv~irt Vae(a 105mrol a) Ardhmt4-r~thmet*c scales Origlinal and Reie Ku and ThanI Data ItN NI I
70 18 I°40 I Clna -Or~lnal 140                                    .            N                        £* Oter.-Orignal
                                                                                          *Joas..*
Mua.n
                                                                                                      -OrtIgnal Revised x x,, *'K 1w°                      *m                                                    KiCasmee- Re~vised rO 10                                                          x 0~
0.1               1           10             100
                              *4. of ,,wemim hIed* hImwt Vw (a 1OSm3) b) ArIthmetic-logartthmic scales Figure 6.1. Depth of water above breach Invert vs. volume of water at the breach time for the original and revised Xu and Zhang case histories.
P AG0E 27
 
JRhS         InaoctonWtlLC VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM The coefficients for the revised regression equations are presented in Tables 6.1 and 6.2 for the best exact and best s implified prediction equations, respectively.
6.5    Application to Teton Darn Failure The revised Xu and Zhang equations were applied to the Teton Dam using the same control variable values as shown in Table 10 of the Xu and Zhang (2009) paper. We selected Teton Dam for this evaluation since, like the hypothetical failure for Jocassee Dam, the Teton Dam failed by piping, whereas the other dam evaluated by Xu and Zhang (2009), Banqiao Dam, was an overtopping failure. Since the evaluation of the erosion category by Professor Briaud, which is summarized in Section 4.2 (see Figures 4.1a and b), indicated that the Teton Dam lies on the boundary between the high and medium erodibility categories, we applied the revised equations for the high and medium erosion categories and then averaged the two Sets of median predicted values.
Tables 6.3 and 6.4 contain the observed and predicted values of the breach parameters for the original Xu and Zhang (2009) and the revised Xu and Zhang described in Section 6.4 for the best exact and best simplified equations, respectively. Two values of observed breach time are shown, 4 hours for the original Xu and Zhang (2009) definition of breach formation time and 1.25 hours for the definition of breach formation time that is used in the revised Xu and Zhang equations based on the Froehlich (1995b and 2008) definition. In addition to displaying the median predicted values, the percent differences between the observed and predicted median values are presented. The lowest percent differences for the original Xu and Zhang (2009) or
*the revised Xu and Zhang equations are indicated in red. For the best exact equations (Table 6.3) the revised approach yields smaller percent differences than the original equations for three out of five breach parameters. For the best simplified equations (Table 6.4) the revised approach yields smaller percent differences than the original equations for four out of five breach parameters. Therefore, for Teton Dam, the revised equation predictions have smaller percent differences with the observed values than the original X u and Zhang (2009) predictions.
The revised regression equations were also evaluated for the Teton Dam based on a mean breach time estimate that was obtained from the uncertainty distribution on predicted peak outflow and the volume of water released through the breach. The basis for this estimate is discussed in Section 7.2 in which the mean estimate is distinguished from the median estimate, which results directly from the multiplicative regression equations for all breach parameters except breach depth. The resulting estimates are provided at the bottom of Tables 6.3 and 6.4 for the best exact and best simplified equations, respectively. In both cases they significantly overestimate the observed breach time. However, these estimates may be reasonable for a reservoir with the stored volume that Teton had at the time of its failure and that the observed breach time was shorter than predicted by the regression equations because of an unusual failure mechanism that has been documented by the Teton Dam owner, .the Bureau of P AG E 28
 
t.*LllliCJlll*)      "*'I,,UIIILW t*IIOIUWG              IIIIU#IalOUUeII --                                                                                            -- ...........
              .      ..          .            ..                                          wmrluaula* aJ        *.            at_ I*.        -"...........
ar*
* 1IF
                                                                                                                                                                                                              -- J VAUDA1TION OF HRR BR*EAC.H H VROGReAPH FOR JOCASEE DAMA Table          6.1. Summary of the five revised Xu'and Zhang best exact regression equations                                                                                        __
Breach Parameter Number                      Contr-ol            bO                                      J b32 I                                                                    j              JS2yvlx(or
            -Variables Y(orlogY)          of Cases                          .0lgO (lg) onlonebr              bi        b2        b31 I    ,,I633                b41                b42          b51*          b52          b53            R12 s2ivyi 1 ,)
f069
                              .. . ......  ......      ..                        Reservoir  _    _  __ Dam Type                          .mErodi1                                      lty_______                _.;.....
Inecpit      SaeCore Wall            CFRD          oogOvertop                        Piping          High      Medium          °Low Hb/A'4,              23            X1,2,3A4.5        0.449      -0.023    0.002  .0.134        ____          0.138            0.1_78 0.271                      0.222:        0.1.86        0.04'1        0.375      0.016 Iog(Bt/flb)            21            lnX1,2;3,4,5        0.088        0.127    0.620.      0.122    ___            -0.053          0;.2,40            -0.328        0.246        -0.201        -0.133          0.594      .0O.213 2            n~,23,*
_________              -        ______02    Coef.      -0.425    ______        Zoned                  :                          022          07            -0_1__      ___67_        0.___7 Iog[ave/HbJS/3            22          InX1,2,3,4.5        -0.308      ;0.029    -0.890    -0.452                    -___
0.409          -0..7.3            -0.759        -0.225      -0.378        -0.823          0.670      0.273 Iog('17/ Tr)            14          INX12,23,4,5        -0.883        O.017    0.715        0.47    ___            -0.678          - *1.114              0.232  .-    0.619        -0.442        0.178          0.646      0.902 Table 6.2._Summary of the five revised Xu and Zhang best simplified regression equations                                                                                                              ___
Breach Parameter        Number- Contr-ol                      bO          b        b2        b 1        b 2    1    b 3              4        I        42            51          b2      1  b                      S2vl 5(or Y(orlogvl            of Cases (tgnhier                CorlogbO)                                            . ____                                                                                              R      S2tcezieX).
Reserv'oirl__"    _    Dam Type ____                                      ___                Erodibility Cate io/              ......
Intercept        Hgt    Shape    CoeWl            ID        HomogOero                            Ping            ih      Mdim              .w
_______Coef,                            __ore_ Wall      ___R    Zoned .Overtop                        Pii___ig                          __di_    Lo Hb/H~d                23              X1,45            0.673      -0.021                            __        .0,.,00.          -______              0.089        0.297          0.26        0.117 __ 0.133              0.013 Iog(Bt/Hb)              24            .InX2A4,5'        -0.241                '0.72    ___              __                        0.121                40.363.        0.23        -0.027J 0.201                0.592        0.181 Iog(Bove/Hb)              24.            Inxz4,5          1.577. ___        0871
                                                                                      ,                        ,,,_                      -1.122              -1*968        -0;667        -1,346      -10O77          0.628        0.245 lo p(Qo/i'gVw5/3)            19              InX2,5          -2.80      _O      _  -1.222  ____-0.55                                                                                    -1.069        -1.281.        0.84        .0.216 Iag(TJ/Tr)              14              INX2,3,5        -1.382    ____      0.859      .0.14    ____          -0.132                                            --0861        -05$3        0.009          0.085        0.538 S u*
                                                      ~PA                                                                                                                                                                          6 E -29
 
VAUDATION OF HRR BREACH HYRGRP                            FOR JOCA SSEE DAM Table 6.3. T,* ton Dam predicton using best exact equations
[Oriinal    Xuand          H                            Revised Au and Thn Predictions Observed Original -Median                ,High Erodibillty              Medium Erodibility        Mdu        rdblt Breach Parameter                  Units Percent Differ-,nce DIffemrenc Value          Value        wt            Uer      Lower        Median    Upper    Lower      Medliant  Value Height o breac Breach top width m
m
___                  19 Observed
                                                                                          -7" 8      _l*        _4  1                151                _*          _
5          5          1    _*            5    _4 15            %
Avemeie breach width                              m          151                          *'hi Peak outfow                                      m*s      *m2            752,              1651 Breach formation time - Original Au and Zhang    hours ZiZ I
: 0.            0.7        9.i 1    0.        (LI      1019                  -*i Breach formation time - Revised Au and Thanl    hours        1.E Table 6.4. Tetc mn Dam predic dtons using best simplified equations Observed j
Orgirsal Au and m~angl 2tl)    redcitons Revised Xu and Thang Predictons Averag High &
Original - Median                HhErodibility                    Medium Er'odibtlity        Mdi Breadh Parameter                  Units Percent Difference I              I          J                  JPercent Value          Value          wt                1 Upper      Lower      Median    Upper      Lower    Median    Value ielst oE breach                                  m      ____
____          -11%                                        ~                          2        jwit Breadh top width                                  m            3                                                              ______        .J!L~          .521 ___O__        served_
Average breads withl                              m            151            12w        -1651 Breach formnation time - Original Au and Th*ang hours            4__
Brmadi fornstion time Revised Xu and Tha*      hours        1.*
I    1161          (Lii      3.41    OMI        (Lii        &TW ~1 Mew P7s3 PAGE  30
 
i.unwarw .wcura~y .*un~,Uve irormauon - wennow          rrom puww desciOwurw per wu w-K £.JWJ,(a)
VALIDATION OF HRR BREACH HYDROGR4PH FOR JOCASSEE DAM Reclamation (Osmun 2013). The failure mechanism involved the development of a large cavity piping of the core materials into the downstream rock had been unnoticed. The piping had within the dam. which formed due to the pervious nature of the foundation and the fact that moved embankment materials and continued for many days or even weeks and formed a large Cavity within the core/center of the dam. Once the cavity collapsed it caused a very sudden failure with a shortened breach time, because a significant amount of material had already been eroded from within the dam, causing an enlarged and sudden opening, which is uncharacteristic of a normal erosional breaching failure. This failure mechanism is discussed in more detail in Appendix C.2.
P AG6E 31
 
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM 7.0  REVISED XU AND ZHANG REGRESSION EQUATIONS SENSITIVITY STUDIES 7.1      Overview of Approach A sensitivity study Was performed to explore the effect of the revisions made to the original Xu and Zhang (2009) regression equations on .the breach hydrograph for a piping failure of Jocassee Dam and compare with the HRR breach hydrograph submitted to the NRC by Duke (2013). The revised Xu and Zhang regression equations were applied to the Jocassee Dam to obtain the median estimates of the breach parameters and their confidence intervals. The revised equations were for the case in which we used the Froehllch (1995b and 2008) breach times and with all Chinese case histories omitted.
The spreadsheet that we used in our previous work to implement the original Xu and Zhang (2009) regression equations (Ehasz and Bowles 2013) was generalized such that a new set of regression coefficients for the revised equations can be input. To calculate the confidence intervals we also input the standard error of regression, the number of control variables, and the number of case histories used to develop each regression equation. The modified spreadsheet was verified against the original version in which the regression coefficients were hard wired and for the applications to the Teton and Banqiao Dams to verify that we closely matched the results published by Xu and Zhang (2009).
The breach parameter estimates obtained from the revised Xu and Zhang regression equations are presented in Section 7.2. Section 7:3 contains an example of inconsistencies between peak breach flow and breach development time for the Jocassee Dam breach hydrograph for the breach Case 2(I00VV) submitted to the NRC by Duke in support of the Safety Evaluation (SE)
(NRC 2011). The HEC-RAS implementation by HDR of the revised Xu and Zhang regression equations breach parameter estimates to obtain a breach hydrograph for Jocassee Darn and a comparison with the HRR breach hy drograph are discussed in Section 7.4.
7.2      Revised Xu and Zhang Breach Parameter Estimates for Jocassee Dam
'The resulting median and 95% confidence interval estimates (lower and upper bounds) are presented on the left Side of Table 7.1 for the revised best exact equations. In addition the breach bottom elevation and average side slopes are calculated and displayed.
For comparison, Table 7.1 .also displays the Froehlich (1995a and 2008) estimates of the breach parameters. Considering the widths of the confidence intervals for both methods, the two methods provide fairly similar median estimates (see Figure 7.1). In particular the median peak outflows; median breach top widths and median breach formation times are quite Similar.
The similarity of the median breach formation time estimates follows from changing the definition of failure time in the revised Xu and Zhang methodology to match that in Froehlich P AG6E 32
 
              . . .... .      .          ..    . ..    .    ..          L.lr_'.-..."....    :
A.....
it-J ..  .            .........
DAMl I
                                                                                                                                                        .FORJOCA$S£E IJIUS                    In association with    RALC                          VALIDATION OF HRR BREACH HYOROGRAPit VALIDATION OF HRR BREACH HVDROGRAPIY FOR JOCA SSEE DAM A
p Table 7.1. Breach parameter estimates from a) revised XU and Zhang without Chinese case histories the Froehlich breach time definition, and b) Froehlich (1995a and 2008)
Revised Xu and Zhang Without (hina                              Frelc          "9bn                08 BreachParameter                                    Froehllch Breach Times
____________________                          Upper            Lower.                  Median      i  Upper              Lower                Median Heigh1t of breach (feet)                                              *1:                                        7                7    2              25.7 BreaCh formation time (hours)                  ,,        b*)F Breach top width (feet)                                          2,78"7                  363                1,009        3,384                ,587                    1,082 Average breach width (feet)                                      2,007                    206                  643        3,392'                    395                  889 Peak outflow (cfs)                                      'b!)F Breach bottom elevation (feet msl)                                  743                  9531                  848              850/                  880                850 Average side slopes (lhoriz.-vert)                                    20                    ,0.9                I.3              0.7l                  0.,7                0.7 nUOia=traom re..re.s~slOn        .Norm~al =linput  vaiue' ,rucs =caicuiateoarrom orner values.                                -    ..          ..                ..
YVolumne above breachblottom (acre-feet)                      .      .            .        ...          1*9,836 1                                                    1 ,117,818:!
  .Triangular breach formation times (hours)                                                -                      1.  .:"                                                  .,.
14.0 13.0 12.0                                      I.
* 11.0              *-*                                                                                                                                  ,      ,
10t.0
            "*9.0
          ,*    7.0 5.0
                        -4                                                      .                        7]..                            .                      _
4.0
        .*. 3.0 2.0 1.0 Failure Breach top Breach top. Average Average                              Peak              Peak Height                        Failure*
breach-of Height breach-of time -            tine,-      width -                width.      breach    breach        outflow- outflow -
Revise.d Xu Froehlich Revised XuuFro ehllch Revised Xu Froehllch width - *width
* RevisedXu Froehllch
                        & Zhang                      & Zhang                    & Zhang                          Revised KU Froehlich &Zhang
                                                                                                                    *&Zhang Breac:h P'arameter.- Regression Methodology Figure 7.1. Relative width of Confidence intervals for the revised Xu and Zhang and Froehlich (1995a and 2008) breach parameter estimates for Jocassee Dam expressed as a ratio to the median estimate (ratio = 1.0).
(1995b and 2008). The confidence bounds for the revised Xu and Zhang regression equationsr are wider than those for FroehliCh (2008) due tO the smaller number Of case histories that remained in the revised Xu and Zharng data set. !nterestingly° there are other case histories with observed values of failure time that included in Froehlich (2008). but which are not included in P AGE 33'
 
I[..flflfrfl v            v
              *.lflR r'_lfl__
vw      *
                                *lfR*,lrl~d*"
                                *.v v
_ aNrm]']f .arl~ljra -  in.I/I.]
W 7 I*lll  #
E    ~
                                                                                      ## Villi
                                                                                                ]I  :;m....:
                                                                                                  .~~~l
                                                                                                                .  .z ..T5 s f li  U VALIDATION OF HRR BREACH HYDROGRAPH FORJOCASSEE DAM the original or revised Xu and Zhang data set. We could have added these but our focus was on workinlg With those that Xu and Zhang (2009) had originally used rather thanl adding new cases.
The median estimate for the breach bottom elevation of 848 feet msl. (and: hence an estimated height of the breach of 277 feet) predicted by the revised. Xu and Zhang method is very similar to the assumed value of 850 feet msl. (and hence an estimated height of the breach of 275 feet) that We independently estimated in our application of the Froehlich (2008) method since that~
method does not predict this .breach parameter. We .based that estimate on the expectation that there would be significant deposition of. material immediately below the darn that would limit the downward breach development. This position is consistent with the. experimental tests on the rockffll dam breaching process by Franca and Almeida-(2002), which showed that "the
    .deposition of the rock blocks: immediately downstream, of the dam has a stabilizing effect, sustaining,the, failure process - this is reflected mainly on the final breach depth which is about 80% of the dam height." In addition, many embankment dam failures case histories document that breaches less than the full dam height have occurred. However, since so few rockfill dams have failed, the experimental work of Franca and Aimeida (2002) is probably the .best indication of the reduced breach depth associated with a rockfilll dam failure due to deposition immediately downstream of the breach.
It is noted that a breach bottom elevation of 850 feet msl. corresponds to releasing about 96%.
of the reserVoir contents below the initial normal full pool at Elevation 1,110 .feet msl. This compares with about 96.5% of the reservoir 'contents- below Elevation 1,110, feet msl. for" a breach bottom at Elevation 848 feet rnsl., which was predicted using the revised Xu and Zhang regression equations that was used in the sensitivity studies. For the original Xu and Zhang (2009) regression equations, .which were used as the basis for the HRR breach hydrograph (Duke 2013), the predicted breach bottom elevation of 870 feet msl. corresponds releasing
    *about 94% of the reservoir contents below Elevation 1,110 feet msl.
An additional sensitivity case is described at the end of Section 7.4 in which the breach bottom elevation was set to Elevation 800 feet msl. and, all the other breach parameters were kept identical to those used forrthe HRR breach hydrograph (Duke 2013). Even though this run was performed in a conservative manner, it was cconclUded that-.a lower breach bottom-does not significantly change the. breach. hydrograph.
The largest difference between estimates from the revised Xu and Zhang and Froehlich (1995b an 2008) methods is for the average breach width and as a result of that, the side slopes. The average side slope, value of 0.7 was assumed in our application of the Froehlich (2008) method.
following a recommendation by Froehlich (2008), whereas the larger values from the revised Xu and Zhang method are predicted Values. As described below in/Section. 7.4, where these different median values were usedrby HDR in the HEC-RAS model there is some effect on the:
breach hydrograph shape due to the different breach cross-sectional areas, but not on the peak p A GE 34v
 
VALIDATION OF HRR BREACH HYDROGRAtPH FOR JOCA-SEE DAM breach flow rate since it is determined by matching the median values for peak outflow predicted by the-resPective methods..
Returning to the estimated median breach formation times from the revised Xu and Zhang and the Froehlich (1995a and 2008) methodologies, we conducted a- simple check on the reasonableness of these predicted times and their consistency with. the..predicted peak outflow rates and Volume of the reservoir contents above the breach bottom elevation. The .check involved assuming that the breach outflow hydrograph has a triangular shape with the base of the 'triangle representing the breach formation time, the height the peak outflow rate, and the area of the triangle the volume of reservoir contents above the breach bottom elevation. Under this assumption ani approximate breach fOrmation. time can be calculated from simple geometry based on Equation 6, which is presented in Section 6.2.8.
The breach formation times estimated from Equation 6 are given at the bottom of Table 7.1.
These times, are clearly much longer than those obtained from both the revised Xu and Zhang and the Froehlich (1995a and 2008) regression m ethodologies. The sources of these significant inconsistencies in breach formation time estimates for Jocassee Dam, are believed to include, the following:
    *, Inconsistencies between case history estimates of observed breach times, peak outflow rates and .volumes of the reservoir contents above the breach bottom elevation in the Wahl (1998), Froehlich (1995b and 2008),and Xu and Zhang ,(2009) data sets (see Section 6.2..8)
* The breach formation time is apparently not well represented by the regression equation methodologies for the large volume of the contents of Lake Jocassee above the breach bottom, which at the normal maximum reservoir level is about twice the volume of water for .the case history with the largest reservoir breach rvolume (Oros, Dam) and about four times the corresponding volumes for the Teton Dam breach (see Figure B.la).
The HEC-RAS simulation model predicts a breach hydrograph with a volume equal to the reservoir Contents above the breach bottOm elevation. Iln such a simulation it would be impossible to match both the predicted values of breach formation times and peak outflow rate from either the revised Xu and Zhang or the Froehlich (1995a and 2008) regression methods because the predicted breach formation. time from the regression methods is too short to release the reservoir, contents.. This 'is illustrated for the Safety Evaluation (SE) (NRC 2011) breach hydrograph for Jocassee Dam in Section 7.3.
Therefore it is clear that both regression methods underestimate the breach formation time for the large volume reservoirs such as Lake Jocassee. To address this shortcoming we developed an adjustment through following procedure, which is described below for the revised Xu and Zhang methodology with references to Figure 7.2:
P A6E 35
                                                                      'I)
 
:r, ~X..JLt-; Lfonzgzc ~AWi.tz!d him wrtft tffm'2cr ,jrrw I"    {7C0 )
In association with 1t 44~~3 VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM ob)(7)(F)
Figure 7.3. Distributions of predicted peak breach outflow rate and breach development time        - Froehlich (1995a and 2008)
P A GE 36
 
                                              ~VALIDATION      OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM
        ,  'The entire probability distribution representing estimation uncertainty for predicted peak breach outflow rate was developed from the 1= through the 99th percentiles using the same equation that was used to calculate the upper and lower bounds by assigning the value of the Student t statistic corresponding to each percentile (left plot in Figure 7.2).
* The distribution, of predicted peak breach outflow rate (left plot in Figure 7.2) was transformed to a distribution of breach formation times (right plot in Figure 7.2) using Equation 6 based .on the triangular breach hydrograph approximation applied to each percentile.
          *Calculate a mean breach formation time needed to release the reservoir contents from the distribution of breech formation times (right plot in Figure 7.2). This was calculated to be cb)(7)(F)    I(see the blue dot-dash line on right plot in Figure 7.2), which corresponds to about the    3 4 th percentile.
          *Obtain ,the mean peak breach outflow rate that is consistent with the mean breach formation time needed, to release the reservoir ,contents using the triangular breach hydrograph aporoximation .- that is. cor~responding to the 34th percentile. This was calculated to bel~)()(F J Icfs (see blue dot-dash line on left plot in Figure 7.2).
The mean breach formation time o*D()F                    Iwas used in HEC-RAS as the time between points B and D as defined on Figure B.4 (see also Figure 7.5 in Section 7.4) together with the median estimates of the breach geometry from the reVised Xu and Zhang methodolog.j-HEC-RAS was then run to approximately match the mean-peak breach outflow rate ofb)7)f)                  cfs by iteratively changing the values of the orifice arid weir coefficients and the breach progression relationship as described in Section 8.6.
The above-adjustment procedure for addressing the shortcoming with the predicted breach formation time was also applied to the Froehlich (1995a and 2008) methodology. The resu*g....
mean breach formation time needed to release the reservoir contents was calculated to be LZF")'
(b()()(see      the green do~t~Ish .line ojn right plot in Figure 7.3) and the corresponding mean peak
*breach outflow rate oj(*)(OF)            j cfs. both of which are at about the 40O~ percentile on their respective probability distributions.
The adjustment described above relies on the relatiVely precise knowledge Of the volume of the reservoir contents above the breach bottom elevation and the predicted values of the peak breach outflow rate, which' of all the breach parameters have the highest R2 valUes for both the revised Xu and Zhang methodology (R2 = 81%) and the Froehlich (1995a and 2008) methodology (R2 = 93%).
Table 7.2 contains a comparison of the breach parameter values used to develop the breach hydrographs in the Safety Evaluation (SE) (NRC, 2011) (discussed in Section 7.3), the HRR (Duke 2013) (discussed in Appendix B.6) and the two 'sensitivity studies (discussed in Section 7,4). Table 7.3 contains the comparison of estimated Jocassee Darn peak breach u  ij                              ill              : i P AGE 37,
 
tv.,,u;,oii-p        , *  .;,o';u            .u.a              - vvninnumg ,'urn puu'Ic uisvwsure per iv L*u'K Z.JIuO IJS                      nassociaion    with RA C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM iiii t l t ii                                                                      w Table 7.2. Comparison of breach parameter values used in the Safety Evaluation (SE)
(NRC 2011), the HRR and the Sensitivity studies SJanuary 2011                  3/12/2013Sestvy-                          Snitit Breach                          Safety                    Hazard        Renstvise    yXan      Srehsithi(1ity Prmtr                Evaluation (SE)              Reevaluation -      Reviad g            and        2008)ch(195 Parameter              (NRC 2011) -              Xu and Zhang                  anad208
_________                    Froehlich                    (2009)
Figure No. for breach                            7.4                        B.5                  7.5                  7.6 hydrographs                ________                      _______
Top Width (feet)                        1,156                        701                  1,009                1,082 BotmWdh425                                              431r                  277                  696 (feet)
Bottom Elevation80878485 (feet msi.)              ____00____                  ____70____                      848_______  ____50__
(.)(7)(F)
Breach Formation Time (without piping phase) (hou rs)
Peak Outflow Rate (million cfs)
Side Slopes                  Right: 1.55, Left:          Rig ht: 0.53, Left:      vrg        .          vrg        .
(horiz:vert).                        0.7          .            0.53          Aveag 1.3              Avrg          .
P A.6 E 38,


===6.5 Application===
Coninins *ecuriwl          -.*enslruvs            In.rirnaton. vvnnuiu nwm,
                                                                  -                                    uuu,J* up-*---Ju-au. gin.
a-----  .u *.arg
                                                                                                                                              -    ----. I--,
Wv.--.W .....  , ...... rJ .Fv ................          W .....  .................                ii* .....
Jd*t.IL*
* VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Table 7.3. Comparison of Estimated Jocassee Dam Peak Breach Outflow Rates provided in the Safety Evaluation (SE) (NRC 2011)
Model                                                                          Peak Outflow (cfs)
McDonald & Langridge-Monopolis (1984)                                              IX)F Costa (1 985)
Evans (1986) scs (1981)
Bureau of Reclamation (1982)
McDonald and Langridg e-Monopolis (1984)                                            ____________________
outflow rates from several regression methodologies that was provided in the Safety Evaluation (NRC 2011).
Table 7.4 summarizes the basis for each breach parameter estimate used in the sensitivity studies that are discussed in Section 7.4. In all cases they are the mean or the more conservative median estimate of the breach parameters. In our FebruarY 201.3 report (Ehasz and Bowles 2013). we concluded that the use of median values of the breach parameter estimates for Jocassee Dam would be a conservative ,choice. We argued that in reality we would expect that the peak breach flow. rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates, which is the range in which the peak breach flow rates fall for both the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 200.8) methodologies. The reasons for expecting the peak breach flow rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates include the fact that Jocassee Dam was designed and constructed as a modern rockfill dam such that it would be expected to be a more resistant dam to the breach process than other low erodibility dams for which failure data were used to develop the revised Xu and Zhang and Froehlich (1995a and 2008) methodologies. In addition, the uni-directional breach formation starting at the right abutment and the downstream deposition of rockfill material Table 7.4. Summary of the basis for each breach param eter used in sensitivity studies Basis for estimate used in sensitivity Breach Parameteranlss_______
Peak Outflow, Q                                            Mean                                          Conservative Breach development                                            Mean                                          Conservative        Consistent with time, T                                                                                                                    Qp& V Breach depth, Hd                                            Mean                                          Conservative Breach top width, Bt                                Median (> M ean)                                      Conservative Breach average width, B                                    Median (> Mean)                                        Conservative P A GE 39v


to Teton Darn Failure The revised Xu and Zhang equations were applied to the Teton Dam using the same control variable values as shown in Table 10 of the Xu and Zhang (2009) paper. We selected Teton Dam for this evaluation since, like the hypothetical failure for Jocassee Dam, the Teton Dam failed by piping, whereas the other dam evaluated by Xu and Zhang (2009), Banqiao Dam, was an overtopping failure. Since the evaluation of the erosion category by Professor Briaud, which is summarized in Section 4.2 (see Figures 4.1a and b), indicated that the Teton Dam lies on the boundary between the high and medium erodibility categories, we applied the revised equations for the high and medium erosion categories and then averaged the two Sets of median predicted values.Tables 6.3 and 6.4 contain the observed and predicted values of the breach parameters for the original Xu and Zhang (2009) and the revised Xu and Zhang described in Section 6.4 for the best exact and best simplified equations, respectively.
am *mlm *mmV            I--.
Two values of observed breach time are shown, 4 hours for the original Xu and Zhang (2009) definition of breach formation time and 1.25 hours for the definition of breach formation time that is used in the revised Xu and Zhang equations based on the Froehlich (1 995b and 2008) definition.
* lISIn                 association withRA VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA5SEE DAM leading to development of tailwater during breach formation also support the peak breach flow rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates. Mohamed (2002) demonstrated that a "side breach" results in a significantly lower peak breach flow rate and narrower breach* width than a "center breach" in simulations of the Teton Dam failure.
In addition to displaying the median predicted values, the percent differences between the observed and predicted median values are presented.
7.3       Example of Inconsistencies               between         Peak Breach Flow and Breach Development Time Figure 7.4 contains the Jocassee Dam breach hydrograph for the breach Case 2(100W) in support of the Safety Evaluation (SE) (NRC 2011) based on a HEC-RAS simulation. The Jocassee headwater hydrograph is represented by the blue line (left scale
The lowest percent differences for the original Xu and Zhang (2009) or*the revised Xu and Zhang equations are indicated in red. For the best exact equations (Table 6.3) the revised approach yields smaller percent differences than the original equations for three out of five breach parameters.
For the best simplified equations (Table 6.4) the revised approach yields smaller percent differences than the original equations for four out of five breach parameters.
Therefore, for Teton Dam, the revised equation predictions have smaller percent differences with the observed values than the original X u and Zhang (2009) predictions.
The revised regression equations were also evaluated for the Teton Dam based on a mean breach time estimate that was obtained from the uncertainty distribution on predicted peak outflow and the volume of water released through the breach. The basis for this estimate is discussed in Section 7.2 in which the mean estimate is distinguished from the median estimate, which results directly from the multiplicative regression equations for all breach parameters except breach depth. The resulting estimates are provided at the bottom of Tables 6.3 and 6.4 for the best exact and best simplified equations, respectively.
In both cases they significantly overestimate the observed breach time. However, these estimates may be reasonable for a reservoir with the stored volume that Teton had at the time of its failure and that the observed breach time was shorter than predicted by the regression equations because of an unusual failure mechanism that has been documented by the Teton Dam owner, .the Bureau of P AG E 28
... ...
aJ at_ -" ...........
IIIIU#IalOUUeII
-- -- ...........1IF --J VAUDA1TION OF HRR H VROGReAPH FOR JOCASEE DAMA Table 6.1. Summary of the five revised Xu'and Zhang best exact regression equations
__Breach Parameter Number Contr-ol bO J I j JS2yvlx(or-Variables
.0lgO bi b2 b31 b32 633 b41 b42 b51* b52 b53 R12 Y(orlogY) of Cases (lg on lonebr ) I ,,I s2ivyi 1 ,)..:... .. ....... ..... ...... ..Reservoir
_ _ __ Dam Type .mErodi1 lty_______
_.;.....Inecp it SaeCore Wall CFRD oogOvertop Piping High Medium °Low Hb/A'4, 23 X1,2,3A4.5 0.449 -0.023 0.002 .0.134 ____ 0.138 0.1_78 0.271 0.222: 0.1.86 0.04'1 0.375 0.016 Iog(Bt/flb) 21 lnX1,2;3,4,5 0.088 0.127 0.620. 0.122 ___ -0.053 0;.2,40 -0.328 0.246 -0.201 -0.133 0.594 .0O.213_________
2 -______02 Coef. -0.425 ______ Zoned : f069 022 07 -0_1__ ___67_ 0.___7 Iog[ave/HbJS/3 22 InX1,2,3,4.5
-0.308 ;0.029 -0.890 -0.452 -___ 0.409 -0..7.3 -0.759 -0.225 -0.378 -0.823 0.670 0.273 Iog('17/ Tr) 14 INX12,23,4,5
-0.883 O.017 0.715 0.47 ___ -0.678 -0.232 .-0.619 -0.442 0.178 0.646 0.902 Table 6.2._Summary of the five revised Xu and Zhang best simplified regression equations
___Breach Parameter Number- Contr-ol bO b b2 b 1 b 2 1 b 3 4 I 42 51 b 2 1 b S2vl 5 (or Y(orlogvl of Cases (tgnhier CorlogbO)
.____ R S 2 tcezieX).Reserv'oirl__" _ Dam Type ____ ___ Erodibility Cate io/ ......Intercept Hgt Shape CoeWl ID HomogOero Ping ih Mdim .w_______Coef, __ore_ Wall ___R Zoned .Overtop Pii___ig __di_ Lo Hb/H~d 23 X1,45 0.673 -0.021 -______ __ .0,.,00. 0.089 0.297 0.26 0.117 __ 0.133 0.013 Iog(Bt/Hb) 24 .InX2A4,5'
-0.241 '0.72 ___ __ 0.121 40.363. 0.23 -0.027J 0.201 0.592 0.181 Iog(Bove/Hb)
: 24. Inxz4,5 1.577. ___ , 0871 ,,,_ -1.122 -0;667 -1,346 -10O77 0.628 0.245 lo p(Qo/i'gVw5/3) 19 InX2,5 -2.80 _O _ -1.222 ____-0.55
-1.069 -1.281. 0.84 .0.216 Iag(TJ/Tr) 14 INX2,3,5 -1.382 ____ 0.859 .0.14 ____ -0.132 --0861 -05$3 0.009 0.085 0.538 S ~PA 6 E -29 VAUDATION OF HRR BREACH HYRGRP FOR JOCA SSEE DAM Table 6.3. T, Observed Breach Parameter Units Value Height o breac m ___Breach top width m ___Avemeie breach width m 151 Peak outfow  Breach formation time -Original Au and Zhang hours ___Breach formation time -Revised Au and Thanl hours 1.E* ton Dam predicton using best exact equations[Oriinal Xuand H Revised Au and Thn Predictions Original -Median Percent DIffemrenc Value wt Observed 19 -7" hi *'752, 16 51 ,High Erodibillty Medium Erodibility Mdu rdblt Differ-,nce Uer Lower Median Upper Lower Medliant Value 8 1 _4 51 1 _5 5 1 5 _4 15 %0. 0.7 9.i 1 0. (LI 1019 ZiZ I  dtons using best simplified equations Revised Xu and Thang Predictons Averag High &HhErodibility Medium Er'odibtlity Mdi I I J JPercent Upper 1 Lower Median Upper Lower Median Value~ 2 jwit______ .J!L~ .521 ___O__ served_Table 6.4. Tetc Observed Breadh Parameter Units Value ielst oE breach m ____Breadh top width m 3 Average breads withl m 151 Breach formnation time -Original Au and hours 4__Brmadi fornstion time Revised Xu and hours mn Dam predic Orgirsal Au and m~angl j 2tl) redcitons Original -Median Percent Difference Value wt____ -11%12w -1651 I 1161 (Lii 3.41 OMI (Lii &TW ~1 Mew P7s3 PAGE 30 i.unwarw .wcura~y irormauon
-wennow rrom puww* desciOwurw per wu w-K £.JWJ,(a)VALIDATION OF HRR BREACH HYDROGR4PH FOR JOCASSEE DAM Reclamation (Osmun 2013). The failure mechanism involved the development of a large cavity piping of the core materials into the downstream rock had been unnoticed.
The piping had within the dam. which formed due to the pervious nature of the foundation and the fact that moved embankment materials and continued for many days or even weeks and formed a large Cavity within the core/center of the dam. Once the cavity collapsed it caused a very sudden failure with a shortened breach time, because a significant amount of material had already been eroded from within the dam, causing an enlarged and sudden opening, which is uncharacteristic of a normal erosional breaching failure. This failure mechanism is discussed in more detail in Appendix C.2.P AG6E 31 VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM 7.0 REVISED XU AND ZHANG REGRESSION EQUATIONS SENSITIVITY STUDIES 7.1 Overview of Approach A sensitivity study Was performed to explore the effect of the revisions made to the original Xu and Zhang (2009) regression equations on .the breach hydrograph for a piping failure of Jocassee Dam and compare with the HRR breach hydrograph submitted to the NRC by Duke (2013). The revised Xu and Zhang regression equations were applied to the Jocassee Dam to obtain the median estimates of the breach parameters and their confidence intervals.
The revised equations were for the case in which we used the Froehllch (1995b and 2008) breach times and with all Chinese case histories omitted.The spreadsheet that we used in our previous work to implement the original Xu and Zhang (2009) regression equations (Ehasz and Bowles 2013) was generalized such that a new set of regression coefficients for the revised equations can be input. To calculate the confidence intervals we also input the standard error of regression, the number of control variables, and the number of case histories used to develop each regression equation.
The modified spreadsheet was verified against the original version in which the regression coefficients were hard wired and for the applications to the Teton and Banqiao Dams to verify that we closely matched the results published by Xu and Zhang (2009).The breach parameter estimates obtained from the revised Xu and Zhang regression equations are presented in Section 7.2. Section 7:3 contains an example of inconsistencies between peak breach flow and breach development time for the Jocassee Dam breach hydrograph for the breach Case 2(I00VV) submitted to the NRC by Duke in support of the Safety Evaluation (SE)(NRC 2011). The HEC-RAS implementation by HDR of the revised Xu and Zhang regression equations breach parameter estimates to obtain a breach hydrograph for Jocassee Darn and a comparison with the HRR breach hy drograph are discussed in Section 7.4.7.2 Revised Xu and Zhang Breach Parameter Estimates for Jocassee Dam'The resulting median and 95% confidence interval estimates (lower and upper bounds) are presented on the left Side of Table 7.1 for the revised best exact equations.
In addition the breach bottom elevation and average side slopes are calculated and displayed.
For comparison, Table 7.1 .also displays the Froehlich (1995a and 2008) estimates of the breach parameters.
Considering the widths of the confidence intervals for both methods, the two methods provide fairly similar median estimates (see Figure 7.1). In particular the median peak outflows; median breach top widths and median breach formation times are quite Similar.The similarity of the median breach formation time estimates follows from changing the definition of failure time in the revised Xu and Zhang methodology to match that in Froehlich P AG6E 32
....... ... ... ... L.lr_'.-.
..".... : A..... J .. ..........
........ ..IJIUS In association with RALC VALIDATION OF HR R BREACH HYOROGRAPit .FOR JOCA$S£E DAM A...... it-.........
l I VALIDATION OF HRR BREACH HVDROGRAPIY FOR JOCA SSEE DAM p Table 7.1. Breach parameter estimates from a) revised XU and Zhang without Chinese case histories the Froehlich breach time definition, and b) Froehlich (1995a and 2008)Revised Xu and Zh ang Without (hina Frelc "9bn 08 BreachParameter Froehllch Breach Times____________________
Upper Lower. Median i Upper Lower Median Heigh1t of breach (feet) 7 7 2 25.7 BreaCh formation time (hours) ,,  Breach top width (feet) 2,78"7 363 1,009 3,384 ,587 1,082 Average breach width (feet) 2,007 206 643 3,392' 395 889 Peak outflow (cfs) 'b!)F Breach bottom elevation (feet msl) 743 9531 848 850/ 880 850 Average side slopes (lhoriz.-vert) 20 ,0.9 I.3 0.7l 0.,7 0.7 nUOia=traom re..re.s~slOn .Norm~al =linput vaiue' ,rucs =caicuiateoarrom orner values. -.. .. ..YVolumne above breachblottom (acre-feet) 1 ...... 1 1 ,117,818:!.Triangular breach formation times (hours) -1. .:" .,.14.0 13.0 12.011.0 10t.07.0 5.0 4.03.0 2.0 1.0 I.* , ,-4 7].. ._ .Height of Height of breach- breach-Revise.d Xu Froehlich& Zhangtime -Revised Xu& Zhang Failure Breach top Breach top. Average tine,- width -width. breach uFro ehllch Revised Xu Froehllch width -& Zhang Revised KU*& Zhang Breac:h P'arameter.-
Regression Methodology Average breach*width Froehlich Peak outflow-RevisedXu&Zhang Peak outflow -Froehllch Figure 7.1. Relative width of Confidence intervals for the revised Xu and Zhang and Froehlich (1995a and 2008) breach parameter estimates for Jocassee Dam expressed as a ratio to the median estimate (ratio = 1.0).(1995b and 2008). The confidence bounds for the revised Xu and Zhang regression equationsr are wider than those for FroehliCh (2008) due tO the smaller number Of case histories that remained in the revised Xu and Zharng data set. !nterestingly° there are other case histories with observed values of failure time that included in Froehlich (2008). but which are not included in P AGE 33' I[..flflfrfl R r'_lfl__ _. _ aNrm]']f .arl~ljra
-in.I/I.] E ~ .~~~l ]I :;m....: ..z .T5 f li U .s v v vw v W 7 # ## Villi -*VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM the original or revised Xu and Zhang data set. We could have added these but our focus was on workinlg With those that Xu and Zhang (2009) had originally used rather thanl adding new cases.The median estimate for the breach bottom elevation of 848 feet msl. (and: hence an estimated height of the breach of 277 feet) predicted by the revised. Xu and Zhang method is very similar to the assumed value of 850 feet msl. (and hence an estimated height of the breach of 275 feet)that We independently estimated in our application of the Froehlich (2008) method since that~method does not predict this .breach parameter.
We .based that estimate on the expectation that there would be significant deposition of. material immediately below the darn that would limit the downward breach development.
This position is consistent with the. experimental tests on the rockffll dam breaching process by Franca and Almeida-(2002), which showed that "the.deposition of the rock blocks: immediately downstream, of the dam has a stabilizing effect, sustaining, the, failure process -this is reflected mainly on the final breach depth which is about 80% of the dam height." In addition, many embankment dam failures case histories document that breaches less than the full dam height have occurred.
However, since so few rockfill dams have failed, the experimental work of Franca and Aimeida (2002) is probably the .best indication of the reduced breach depth associated with a rockfilll dam failure due to deposition immediately downstream of the breach.It is noted that a breach bottom elevation of 850 feet msl. corresponds to releasing about 96%.of the reserVoir contents below the initial normal full pool at Elevation 1,110 .feet msl. This compares with about 96.5% of the reservoir
'contents-below Elevation 1,110, feet msl. for" a breach bottom at Elevation 848 feet rnsl., which was predicted using the revised Xu and Zhang regression equations that was used in the sensitivity studies. For the original Xu and Zhang (2009) regression equations, .which were used as the basis for the HRR breach hydrograph (Duke 2013), the predicted breach bottom elevation of 870 feet msl. corresponds releasing94% of the reservoir contents below Elevation 1,110 feet msl.An additional sensitivity case is described at the end of Section 7.4 in which the breach bottom elevation was set to Elevation 800 feet msl. and, all the other breach parameters were kept identical to those used forrthe HRR breach hydrograph (Duke 2013). Even though this run was performed in a conservative manner, it was cconclUded that-.a lower breach bottom-does not significantly change the. breach. hydrograph.
The largest difference between estimates from the revised Xu and Zhang and Froehlich (1995b an 2008) methods is for the average breach width and as a result of that, the side slopes. The average side slope, value of 0.7 was assumed in our application of the Froehlich (2008) method.following a recommendation by Froehlich (2008), whereas the larger values from the revised Xu and Zhang method are predicted Values. As described below in/Section.
7.4, where these different median values were usedrby HDR in the HEC-RAS model there is some effect on the: breach hydrograph shape due to the different breach cross-sectional areas, but not on the peak p A GE 34v VALIDATION OF HRR BREACH HYDROGRAtPH FOR JOCA-SEE DAM breach flow rate since it is determined by matching the median values for peak outflow predicted by the-resPective methods..Returning to the estimated median breach formation times from the revised Xu and Zhang and the Froehlich (1995a and 2008) methodologies, we conducted a- simple check on the reasonableness of these predicted times and their consistency with. the..predicted peak outflow rates and Volume of the reservoir contents above the breach bottom elevation.
The .check involved assuming that the breach outflow hydrograph has a triangular shape with the base of the 'triangle representing the breach formation time, the height the peak outflow rate, and the area of the triangle the volume of reservoir contents above the breach bottom elevation.
Under this assumption ani approximate breach fOrmation.
time can be calculated from simple geometry based on Equation 6, which is presented in Section 6.2.8.The breach formation times estimated from Equation 6 are given at the bottom of Table 7.1.These times, are clearly much longer than those obtained from both the revised Xu and Zhang and the Froehlich (1 995a and 2008) regression m ethodologies.
The sources of these significant inconsistencies in breach formation time estimates for Jocassee Dam, are believed to include, the following:
*, Inconsistencies between case history estimates of observed breach times, peak outflow rates and .volumes of the reservoir contents above the breach bottom elevation in the Wahl (1998), Froehlich (1995b and 2008),and Xu and Zhang ,(2009) data sets (see Section 6.2..8)* The breach formation time is apparently not well represented by the regression equation methodologies for the large volume of the contents of Lake Jocassee above the breach bottom, which at the normal maximum reservoir level is about twice the volume of water for .the case history with the largest reservoir breach rvolume (Oros, Dam) and about four times the corresponding volumes for the Teton Dam breach (see Figure B.la).The HEC-RAS simulation model predicts a breach hydrograph with a volume equal to the reservoir Contents above the breach bottOm elevation.
Iln such a simulation it would be impossible to match both the predicted values of breach formation times and peak outflow rate from either the revised Xu and Zhang or the Froehlich (1 995a and 2008) regression methods because the predicted breach formation.
time from the regression methods is too short to release the reservoir, contents..
This 'is illustrated for the Safety Evaluation (SE) (NRC 2011)breach hydrograph for Jocassee Dam in Section 7.3.Therefore it is clear that both regression methods underestimate the breach formation time for the large volume reservoirs such as Lake Jocassee.
To address this shortcoming we developed an adjustment through following procedure, which is described below for the revised Xu and Zhang methodology with references to Figure 7.2: P A 6E 35'I)
:r, ~X..JLt-;
Lfonzgzc ~AWi.tz!d him wrtft tffm'2cr ,jrrw I" {7C0 )In association with 1t 4 4~~3 VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM ob)(7)(F)Figure 7.3. Distributions of predicted peak breach outflow rate and breach development time -Froehlich (1995a and 2008)P A GE 36
~VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM , 'The entire probability distribution representing estimation uncertainty for predicted peak breach outflow rate was developed from the 1 = through the 99th percentiles using the same equation that was used to calculate the upper and lower bounds by assigning the value of the Student t statistic corresponding to each percentile (left plot in Figure 7.2).* The distribution, of predicted peak breach outflow rate (left plot in Figure 7.2) was transformed to a distribution of breach formation times (right plot in Figure 7.2) using Equation 6 based .on the triangular breach hydrograph approximation applied to each percentile.
*Calculate a mean breach formation time needed to release the reservoir contents from the distribution of breech formation times (right plot in Figure 7.2). This was calculated to be cb)(7)(F)
I(see the blue dot-dash line on right plot in Figure 7.2), which corresponds to about the 3 4 th percentile.
*Obtain ,the mean peak breach outflow rate that is consistent with the mean breach formation time needed, to release the reservoir ,contents using the triangular breach hydrograph aporoximation
.- that is. cor~responding to the 34th percentile.
This was calculated to bel~)()(F J Icfs (see blue dot-dash line on left plot in Figure 7.2).The mean breach formation time Iwas used in HEC-RAS as the time between points B and D as defined on Figure B.4 (see also Figure 7.5 in Section 7.4) together with the median estimates of the breach geometry from the reVised Xu and Zhang methodolog.j-HEC-RAS was then run to approximately match the mean-peak breach outflow rate ofb)7)f) cfs by iteratively changing the values of the orifice arid weir coefficients and the breach progression relationship as described in Section 8.6.The above-adjustment procedure for addressing the shortcoming with the predicted breach formation time was also applied to the Froehlich (1995a and 2008) methodology.
The mean breach formation time needed to release the reservoir contents was calculated to be LZF")'(b()()(see the green do~t~Ish .line ojn right plot in Figure 7.3) and the corresponding mean peak*breach outflow rate j cfs. both of which are at about the 40O~ percentile on their respective probability distributions.
The adjustment described above relies on the relatiVely precise knowledge Of the volume of the reservoir contents above the breach bottom elevation and the predicted values of the peak breach outflow rate, which' of all the breach parameters have the highest R 2 valUes for both the revised Xu and Zhang methodology (R 2 = 81%) and the Froehlich (1995a and 2008)methodology (R 2 = 93%).Table 7.2 contains a comparison of the breach parameter values used to develop the breach hydrographs in the Safety Evaluation (SE) (NRC, 2011) (discussed in Section 7.3), the HRR (Duke 2013) (discussed in Appendix B.6) and the two 'sensitivity studies (discussed in Section 7,4). Table 7.3 contains the comparison of estimated Jocassee Darn peak breach u ij ill : i P AGE 37, tv.,,u;,oii-p , .;,o';u .u.a -vvninnumg
,'urn puu'Ic uisvwsure per iv Z.JIuO IJS nassociaion with RA C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM iiii t l t ii w Table 7.2. Comparison of breach parameter values used in the Safety Evaluation (SE)(NRC 2011), the HRR and the Sensitivity studies SJanuary 2011 3/12/2013Sestvy-Snitit Breach Safety Hazard Renstvise yX an Srehsithi(1ity Prmtr Evaluation (SE) Reevaluation
-Reviad g and 2008)ch(195 Parameter (NRC 2011) -Xu and Zhang anad208_________
Froehlich (2009)Figure No. for breach 7.4 B.5 7.5 7.6 hydrographs
________ _______Top Width (feet) 1,156 701 1,009 1,082 BotmWdh425 431r 277 696 (feet)Bottom Elevation80878485 (feet msi.) ____00____
____70____
848_______
____50__(.)(7)(F)Breach Formation Time (without piping phase) (hou rs)Peak Outflow Rate (million cfs)Side Slopes Right: 1.55, Left: Rig ht: 0.53, Left: vrg .vrg .(horiz:vert).
0.7 .0.53 Aveag 1.3 Avrg .P A.6 E 38, Coninins -.
In.rirnaton.
-vvnnuiu nwm, gin. .u a----- -----.I--, rJ Wv.--.W ..... , ...... .Fv ................
W ..... .................
.....VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Table 7.3. Comparison of Estimated Jocassee Dam Peak Breach Outflow Rates provided in the Safety Evaluation (SE) (NRC 2011)Model Peak Outflow (cfs)McDonald & Langridge-Monopolis (1984) IX)F Costa (1 985)Evans (1986)scs (1981)Bureau of Reclamation (1982)McDonald and Langridg e-Monopolis (1984) ____________________
outflow rates from several regression methodologies that was provided in the Safety Evaluation (NRC 2011).Table 7.4 summarizes the basis for each breach parameter estimate used in the sensitivity studies that are discussed in Section 7.4. In all cases they are the mean or the more conservative median estimate of the breach parameters.
In our FebruarY 201.3 report (Ehasz and Bowles 2013). we concluded that the use of median values of the breach parameter estimates for Jocassee Dam would be a conservative ,choice. We argued that in reality we would expect that the peak breach flow. rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates, which is the range in which the peak breach flow rates fall for both the adjusted revised Xu and Zhang and the adjusted Froehlich (1 995a and 200.8) methodologies.
The reasons for expecting the peak breach flow rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates include the fact that Jocassee Dam was designed and constructed as a modern rockfill dam such that it would be expected to be a more resistant dam to the breach process than other low erodibility dams for which failure data were used to develop the revised Xu and Zhang and Froehlich (1995a and 2008) methodologies.
In addition, the uni-directional breach formation starting at the right abutment and the downstream deposition of rockfill material Table 7.4. Summary of the basis for each breach param eter used in sensitivity studies Basis for estimate used in sensitivity Breach Parameteranlss_______
Peak Outflow, Q Mean Conservative Breach development Mean Conservative Consistent with time, T Qp& V Breach depth, Hd Mean Conservative Breach top width, Bt Median (> M ean) Conservative Breach average width, B Median (> Mean) Conservative P A GE 39v am  I--. *lISIn association withRA VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA5SEE DAM leading to development of tailwater during breach formation also support the peak breach flow rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates.
Mohamed (2002) demonstrated that a "side breach" results in a significantly lower peak breach flow rate and narrower width than a "center breach" in simulations of the Teton Dam failure.7.3 Example of Inconsistencies between Peak Breach Flow and Breach Development Time Figure 7.4 contains the Jocassee Dam breach hydrograph for the breach Case 2(100W) in support of the Safety Evaluation (SE) (NRC 2011) based on a HEC-RAS simulation.
The Jocassee headwater hydrograph is represented by the blue line (left scale
* 1000), the Jocassee tailwater hydrograph is represented by the brown line (left scale
* 1000), the Jocassee tailwater hydrograph is represented by the brown line (left scale
* 1,000) and the Jocassee breach discharge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam. The assumed sinusoidal form for the breach progression relationship is shown by the black line (left scale).The peak breach flow rate for the Safety Evaluation (SE) (NRC 2011) hydrograph shown in Fiue7.4 is abo cfs for the SE hydrograph based on using a breach formation time Figure 7.4. Jocassee Dam breach progression relationship and breach hydrographs based on the breach Case 2(100W) in t he Safety Evaluation (SE) (NRC 2011)P A GE 40 l P In association., w  VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM m i .p and median breach geometry parameter estimates based on Froehlich (1995a).The inconsistency between the peak breach flow rate and the breach development time for the SE breach hyrgahis cleanl seen in Figure 7.4 because the breach progression  
* 1,000) and the Jocassee breach discharge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam. The assumed sinusoidal form for the breach progression relationship is shown by the black line (left scale).
*relationship reaches 100% aftep(7)(Fj j which implies that the breach develgpment is~ complete at that time. However, at this time the simulated breach flow rate is abouJ~b)(F)F Jcfs. The breach size certainly would not have stabilized at such a large flow rate and would be growing quite rapidly. If a more realistic and longer breach development time, consistent with emptying the reservoir had been used the rate would have been, much smaller (the breach time ~would need to be longer thatq' "Jas in the S E hydrograph and the peak outflow rate of[ L)(TF) ......Jcfs would decrease for a longer breach time). This type of physical inconsistency is determined by the underestimation of the breach development time that is input to HEC-RAS based on the estimate from Froehlich (1995b)3.The HEC-RAS model does not simulate the physical erosion and instability processes that would take place in an actual breach and therefore the model has no way to assure a consistent simulation unless a consistent set of breach parameters are input to the model. Achieving this consistency is the purpose of the adjustment that is described in Section 7.2 to account for the *time required to completely empty the Jocassee reservoir and which is applied in the sensitivity analyses presented in Section 7.4.7.4 Discussion of HEC-RAS Results Figure 7.5 contains the breach hydrographs developed by HDR using HEC-RAS based on the breach parameters estimated from the adjusted revised Xu and Zhang regression equations with the Froehlich breach development time definition and the Chinese case histories excluded as summarized in Section 6.3.2. Figure 7.6 contains the breach hydrographs based on the breach parameters estimated from the adjusted Froehlich (1 995a and 2008) regression equations.
The peak breach flow rate for the Safety Evaluation (SE) (NRC 2011) hydrograph shown in Fiue7.4 is abo *()(7F)        cfs for the SE hydrograph based on using a breach formation time
The predicted values of peak breach outflow rate and breach development time for both the revised Xu and Zhang and the Froehlich (1 995b and 2008) methodologies are therefore the mean ,eStimates obtained using the adjustment as described in Section 7.2 to account for the time required to completely empty the Jocassee reservoir (see Table 7.4). In Figures 7.5 and 7.6, the Jocassee headwater hydrograph is represented by the blue line (left scale
'*b)(7)(P)
* 1000), the Jocassee tailwater hydrograph is represented by the brown line (left scale'*1,000) and the Jocassee breach discharge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam.The breach progression relationship, which is a required HEC-RAS input, and which was developed iteratively as described in Section 7.2, is shown by the black line (left scale). Points A, B and D are equivalent to points that are defined in Figure 6.4. The final values of the orifice 3 A similar underestimation of breach development time has been identified in Section 7;2 for Xu and Zhang (2009).P AGCE 42.  
Figure 7.4. Jocassee Dam breach progression relationship and breach hydrographs based on the breach Case 2(100W) in t he Safety Evaluation (SE) (NRC 2011)
,JR Ina +oton with VAUIDATION OF HRR BREACH HYDROGRAPH FOR JOC.ASSEE DAM p Figure 7.5. Jocassee Dam breach progression relationship and breach hydrographs  
P A GE 40
-sensitivity run using revised Xu and Zhang breach parameter estimates D:)fTj(F)Figure 7.6. Jocassee Dam breach progression relationship and breach hydrographs  
 
-sensitivity run using Froehlich (1995b and 2008) breach parameter estimates P A GE 42 VALIDATION OF HRR BREACH H VDROGRiAPH FOR JOCASSEE DAM coefficients of 0.1 for both the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) breach parameter estimates appear to be reasonable in terms of representing a piping flow through the rockfill material.
l P               Inassociation.,w  *ithRL VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM m     i                                                                             .p o4(D(7)*) and median breach geometry parameter estimates based on Froehlich (1995a).
Similarly, the final values of the weir coefficients 2.2 and 2.0 for the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008)breach~parameter estimates, respectively, appear to be reasonable in terms of representing flow through the breach following .collapse of ther dam crest of the rockflll dam.In addition, the form of the resulting breach hydrographs Shown in Figures 7.5 and 7.6 also appear to be reasonable for a piping failure mode and closely match the mean peak breach flow rate estimates obtained for the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) methodologies,.respectively.
The inconsistency between the peak breach flow rate and the breach development time for the SE breach hyrgahis cleanl seen in Figure 7.4 because the breach progression *relationship reaches 100% aftep(7 )(Fj           j which implies that the breach develgpment is~ complete at that time. However, at this time the simulated breach flow rate is abouJ~b)(F)F                     Jcfs. The breach size certainly would not have stabilized at such a large flow rate and would be growing quite rapidly. If a more realistic and longer breach development time, consistent with emptying the reservoir contents* had been used the               *a.~ilow rate would have been, much smaller (the breach time ~would need to be longer thatq' "Jas             in the S E hydrograph and the peak outflow rate of[L)(TF) ...... Jcfs would decrease for a longer breach time). This type of physical inconsistency is determined by the underestimation of the breach development time that is input to HEC-RAS based on the estimate from Froehlich (1995b)3 . The HEC-RAS model does not simulate the physical erosion and instability processes that would take place in an actual breach and therefore the model has no way to assure a consistent simulation unless a consistent set of breach parameters are input to the model. Achieving this consistency is the purpose of the adjustment that is described in Section 7.2 to account for the *time required to completely empty the Jocassee reservoir and which is applied in the sensitivity analyses presented in Section 7.4.
Point A represents the beginning of the HEC-RAS simulation of the enlargement of the pipe. The breach progression curve was adjusted to keep the flow rate to a reasonably low magnitude prior to the collapse of the pipe and the onset of overtopping that is simulated at point B on Figures 7.5 and 7.6. These points mark the end of the breach initiation phase as defined in the revised Xu and Zhang methodology, which is consistent with the definition used by Froehlich (1 995b and 2008) and Wahl (2013). Point D on Figures 7.5 and 7.6 marks the end of the breach development phase. The times between points B .and D in Figures '7.5 and 7.6 are approximately equal to the mean breach development time estimated using the adjustment described in Section 7.2 for both the revised Xu and Zhang and Froehlich (1 995a and 2008) methodologies, respectively.
7.4     Discussion of HEC-RAS Results Figure 7.5 contains the breach hydrographs developed by HDR using HEC-RAS based on the breach parameters estimated from the adjusted revised Xu and Zhang regression equations with the Froehlich breach development time definition and the Chinese case histories excluded as summarized in Section 6.3.2. Figure 7.6 contains the breach hydrographs based on the breach parameters estimated from the adjusted Froehlich (1995a and 2008) regression equations. The predicted values of peak breach outflow rate and breach development time for both the revised Xu and Zhang and the Froehlich (1995b and 2008) methodologies are therefore the mean ,eStimates obtained using the adjustment as described in Section 7.2 to account for the time required to completely empty the Jocassee reservoir (see Table 7.4). In Figures 7.5 and 7.6, the Jocassee headwater hydrograph is represented by the blue line (left scale
When Compared with the breach hydrographs from the HRR (Duke 2013), shown in Figure B.5, we conclude that. the breach hydrographs in Figures 7.5 and 7.6. which are based on the adjusted revised Xu and Zhang and the adjusted Froehlich (1 995a and 2008) breach parameter estimates, respectively, provide good support for the HRR breach hydrographs (Duke 2013). In our February 2013 (Ehasz and Bowles 2013) we concluded that the breach hydrograph in Figure B.5 is a realistic but conservative breach hydrograph that has good defendablity based on the validity of the Xu and Zhang (2009) method, the conservative nature of the median breach~parameter estimates, a piping failure mode initiating in Jthe deposition' of rockfill immediately below the dam, the low erosion category of the rockfill material, and the various characteristics of a modern dam that were included in the design and construction of Jocassee Dam.An additional sensitivity case was considered in which the breach bottom .elevation was set to ,Elevation 800 feet nmsl, corresponding tO 99.4% of the reservoir contents below the initial normal full pool at Elevation 1,110 feet msl, and all the other breach parameters were kept identical to those used for the HRR breach hydrograph (Duke 2013), including the breach progression relationship.
* 1000), the Jocassee tailwater hydrograph is represented by the brown line (left scale'*
The resulting hydrographs are presented in Figure 7.7 using the same format as used in Figures 7.4, 7.5, 7.6 and B.5. The effects of the. lower breach bottom elevation, can be seen by comparing the results in .Figure 7.7 with those in Figure B.5 for the HRR breach hydrograph in which the breach bottom elevation was at Elevation 870 feet msl, which is the P A 6E 43 tISIn association with J VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Figure 7.7. Jocassee Dam breach progression relationship and breach hydrographs  
1,000) and the Jocassee breach discharge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam.
-sensitivity run using breach bottom elevation of 800 feet msl. and all other breach parameters identical to those in the HRR breach hydrograph (Duke 2013) based on Xu and Zhang (2009)estimate based on Xu and Zhang (2009), and which corresponds to 94:1% of the reservoir contents below the initial normal full pool at Elevation 1,110 feet msl. In the simulation the additional reservoir contents is released mainly on the falling limb of the hydrograph resulting in higher flows for much of the falling limb starting with a somewhat flat portion of the hydrograph following the peak flow rate. Although it is considered that a more realistic simulation of the lower breach bottom would tend to lengthen the falling limb rather than raising it, we view this simulation, in which the breach development time was constrained to match the time used in the HRR hydrograph, as a conservative case in terms of the effects on the downstream flow conditions.
The breach progression relationship, which is a required HEC-RAS input, and which was developed iteratively as described in Section 7.2, is shown by the black line (left scale). Points A, B and D are equivalent to points that are defined in Figure 6.4. The final values of the orifice 3 A similar underestimation of breach development time has been identified in Section 7;2 for Xu and Zhang (2009).
Therefore a more realistic simulation was not pursued and it was concluded that a lower breach bottom would not significantly change the breach hydrograph even under the conservative sensitivity case summarized above.The discussions in Appendices C.1 and C.2 benchmark the characteristics of several recent large embankment dam failures.
P AGCE 42.
They also describe the properties and failure conditions as well as embankment design considerations affecting these breaches and their relevance to the Jocassee Dam.PAG0E 4 lI S in association with VALIDATION OF HRR BREACH HYDROGRAPH FOR.JOCASSEE DAM  
 
                  ,JR Ina +otonwith VAUIDATION OF HRR BREACH HYDROGRAPH FOR JOC.ASSEE DAM p
Figure 7.5. Jocassee Dam breach progression relationship and breach hydrographs -
sensitivity run using revised Xu and Zhang breach parameter estimates D:)fTj(F)
Figure 7.6. Jocassee Dam breach progression relationship and breach hydrographs             -
sensitivity run using Froehlich (1995b and 2008) breach parameter estimates P A GE 42
 
VALIDATION OF HRR BREACH   H VDROGRiAPH FOR JOCASSEE DAM coefficients of 0.1 for both the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) breach parameter estimates appear to be reasonable in terms of representing a piping flow through the rockfill material. Similarly, the final values of the weir coefficients 2.2 and 2.0 for the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) breach~parameter estimates, respectively, appear to be reasonable in terms of representing flow through the breach following .collapse of ther dam crest of the rockflll dam.
In addition, the form of the resulting breach hydrographs Shown in Figures 7.5 and 7.6 also appear to be reasonable for a piping failure mode and closely match the mean peak breach flow rate estimates obtained for the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) methodologies,.respectively. Point A represents the beginning of the HEC-RAS simulation of the enlargement of the pipe. The breach progression curve was adjusted to keep the flow rate to a reasonably low magnitude prior to the collapse of the pipe and the onset of overtopping that is simulated at point B on Figures 7.5 and 7.6. These points mark the end of the breach initiation phase as defined in the revised Xu and Zhang methodology, which is consistent with the definition used by Froehlich (1995b and 2008) and Wahl (2013). Point D on Figures 7.5 and 7.6 marks the end of the breach development phase. The times between points B .and D in Figures '7.5 and 7.6 are approximately equal to the mean breach development time estimated using the adjustment described in Section 7.2 for both the revised Xu and Zhang and Froehlich (1995a and 2008) methodologies, respectively.
When Compared with the breach hydrographs from the HRR (Duke 2013), shown in Figure B.5, we conclude that. the breach hydrographs in Figures 7.5 and 7.6. which are based on the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) breach parameter estimates, respectively, provide good support for the HRR breach hydrographs (Duke 2013). In our February 2013 *report (Ehasz and Bowles 2013) we concluded that the breach hydrograph in Figure B.5 is a realistic but conservative breach hydrograph that has good defendablity based on the validity of the Xu and Zhang (2009) method, the conservative nature of the median breach~parameter estimates, a piping failure mode initiating in th*())F)                Jthe deposition' of rockfill immediately below the dam, the low erosion category of the rockfill material, and the various characteristics of a modern dam that were included in the design and construction of Jocassee Dam.
An additional sensitivity case was considered in which the breach bottom .elevation was set to
,Elevation 800 feet nmsl, corresponding tO 99.4% of the reservoir contents below the initial normal full pool at Elevation 1,110 feet msl, and all the other breach parameters were kept identical to those used for the HRR breach hydrograph (Duke 2013), including the breach progression relationship. The resulting hydrographs are presented in Figure 7.7 using the same format as used in Figures 7.4, 7.5, 7.6 and B.5. The effects of the. lower breach bottom elevation, can be seen by comparing the results in .Figure 7.7 with those in Figure B.5 for the HRR breach hydrograph in which the breach bottom elevation was at Elevation 870 feet msl, which is the P A 6E 43
 
tISIn             association with J VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Figure 7.7. Jocassee Dam breach progression relationship and breach hydrographs -
sensitivity run using breach bottom elevation of 800 feet msl. and all other breach parameters identical to those in the HRR breach hydrograph (Duke 2013) based on Xu and Zhang (2009) estimate based on Xu and Zhang (2009), and which corresponds to 94:1% of the reservoir contents below the initial normal full pool at Elevation 1,110 feet msl. In the simulation the additional reservoir contents is released mainly on the falling limb of the hydrograph resulting in higher flows for much of the falling limb starting with a somewhat flat portion of the hydrograph following the peak flow rate. Although it is considered that a more realistic simulation of the lower breach bottom would tend to lengthen the falling limb rather than raising it, we view this simulation, in which the breach development time was constrained to match the time used in the HRR hydrograph, as a conservative case in terms of the effects on the downstream flow conditions. Therefore a more realistic simulation was not pursued and it was concluded that a lower breach bottom would not significantly change the breach hydrograph even under the conservative sensitivity case summarized above.
The discussions in Appendices C.1 and C.2 benchmark the characteristics of several recent large embankment dam failures. They also describe the properties and failure conditions as well as embankment design considerations affecting these breaches and their relevance to the Jocassee Dam.
PAG0E 4
 
lI       S       in association with l*~C VALIDATION OF HRR BREACH HYDROGRAPH FOR.JOCASSEE DAM
 
==8.0    CONCLUSION==
S 8.1    Discuss Overall Conclusion The overall conclusion of this report is that the HRR breach hydrographs (Duke 2013), which was based on the original Xu and Zhang (2009) breach parameter regression equations, is a reasonable and conservative estimate of the downstream effects of a deterministic sunny-day breach of the Jocassee Dam. This conclusion is supported by our review of the data on which the Xu and Zhang (.2009) methodology is based, the confirmation of the assignment of a low erosion category to Jocassee Dam, and by comparisons with two additional breach hydrographs that are based on the Froehlich (1995a and 2008) regression equations and the revised Xu and Zhang regression equations in which the agency questions about the original Xu and Zhang (2009) methodology have been addressed. Both the revised Xu and Zhang and Froehlich (1995a and 2008) methodologies have been adjusted to allow for sufficient time to drain Lake Jocassee down to the breach bottom elevation (see Section 7.2)
The specific conclusions for this report are organized into two parts. In Section 8.2 we summarize our conclusions regarding our responses to the five agency questions. In Section 8.3 we summarize our conclusions from the review and revision of the Xu and Zhang (2009) methodology and the support that its application and an application of the adjusted Froehlich (1995b and 2008) methodology, to Jocassee Dam provide for the HRR breach hydrographs submitted to the NRC by Duke (2013).
8.2    Concluding Responses to Agency Questions
: 1) Precedence: Several uses of the Xu and Zhang (2009) ;methodology have been identified in addition to its application to Jocassee Dam. This new methodology seems to be following a pathway to broader acceptance in which its significant advantage over other methods by accounting for the important physical characteristic, Of erodibility is becoming recognized.          The initial questions about the methodology are being addressed, including how to appropriately define and apply failure time estimates in dam breach modeling.
: 2) Chinese case histories: About 43% of the 75 dam failure case histories on which the Xu and Zhang (2009) methodology is based are for Chinese dams. Our review indicated that Xu and Zhang (2009) did appropriate screening and interpretation of the case history data from all sources, including China; although we identified a few improvements [see 2 in Section 8:3 belowj. The quality of data for the Chinese case histories appears to be similar to that available for US case histories with more recent breaches; although access to some of this data has been limited outside of China. The poorer construction of Chinese dams built prior to 1977 would be expected to, result in a more erodible dam once a breach process has initiated. This was appropriately P A GE 45
 
VALIDATION OF HRR BREA CM HYDROGRAPH FOR JOCASSEE DAM accounted for by assigning a higher erosion category in the Xu and Zhang (2009)
      **methodology.
: 3) Representation of case histories for rockfill and other low erodibility dams: The small number of case histories for rockfiUl dams that are classified with low erodibility is a reality that is likely due to the intrinsic safety of such rockfill dams. This limitation applies to all regression methodologies. However, the inclusion of the Briaud (2008) erosion categories as a control variabl e in the Xu and Zhang (2009) methodology provides a way to account for the important* influence of the erodibility of materials on breach parameters. Also, Xu and Zhang (2009) increased the number of case histories by including case histories from China for the Danghe and Gouhou large ro ckfilI dams.
: 4) Use of the Briaud erosion categories: Professor Briaud's independent review confirmed the following:
            !  Theappropriateness of using his erosion categories in the Xu and Zhang (2009) methodology.
* The Xu and Zhang (2009) two-step procedure for assigning low, medium or high erosion categories to case history dams is consistent with' his research findings:
i) an initial categorization as a range based on the soil type within the dam as low to medium erodibility for rockfill and clay and medium to high erodibility for silt,
                ,and sand; and ii) an up or down adjustment in the initial range based on construction quality, particularly compaction effort, that, is dePendent mainly on the period of construction but also dam cross-sectional geometry and slope surface protection.      In a few cases erosion categories were changed as summarized in 2 in Section 8.3 below.
* The assignment of a low erosion category for Jocassee Dam was confirmed through a conservative analysis of the erosion rates for cross-section materials based on both velocity and shear stress.
: 5) Breach time definition: The definition of breach time used by Xu and Zhang (2009) includes both a part of the breach initiation process in addition to the breach formation process unlike other regression methods (e.g. Froehlich 1995b and 2008) that include only the latter. We found that this difference in definitions is of no concern as long as it is appropriately accounted for in using the predicted breach time in a way that is consistent with the HEC-RAS model definitions.
8.3    Concluding Support for the HRR Breach Hydrograph
: 1) Agency Concerns: Our review of the agency questions (summarized in Section 8.2) indicates support for the original application of Xu and Zhang (2009) tO estimate breach parameters on Which the HRR breach hydrographs are based; although some improvements to the Xu and. Zhang (2009) data base w ere identified [see 2) below]..
P AGE 46
 
SIn association with l*4C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM
: 2) Revised Xu and Zhang regression equations sensitivity studies: The revised regression equations were developed by Dr. Xu based on the following changes and improvements to the XUi and Zhang (2009) data set:
          *Changed breach development times to the commonly-used Froehlich (1995b and 2008) definition. This change was seen as a way to predict the duration o~f the breach hydrograph in HEC-RAS; but, as summarized in 3) below, a broader issue with inconsistent "observed" breach times was found that required another step to obtain a reasonable predicted dur ation.
* Changed the values of other breach param eters and control variables where they were inconsistent with the Wahl (1998) and FroehliCh (1995a and' b and 2008) data sets with consideration given to reliable information from other, sources.
* Changed some assigned erosion categories to include the consideration that compaction associated with construction practices in the US and other developed.
countries (not China) improved for earthfill dams after about 1950 and for rockfiht dams after about 1965.
* Changed to a higher erosion category where a lower category had been assigned because of long observed failure times but where all other available information pointed to the higher erosion category.
        '    Embankment dams with a core wall or concrete-faced dams that had been assigned to the low erosion category as a means of accounting for the throttling effects of these features on breach development were omitted from the revised data set because their breach parameters would not be representative of low erodibility embankment dams in general.
* All Chinese case histories were omitted from the revised data set to avoid the potential criticism that we only had indirect access to the original references for these case histories.
: 3) InConsistencies between peak breach flows and breach development times: An inconsistency was identified for many case histories in the WahI (1998), Froehlich (1 995a and b and 2008), and XU and Zhang (2009) data sets. Specifically, the
    ;'observed" breach development time is too short to discharge the reservoir contents above the breach bottom and match the "observed" peak breach flow rate. This inconsistency can be clearly seen in the Jocassee Dam breach hydrograph submitted to the NRC by Duke in support of the Safety Evaluation (E) Report (NRC 2011t) (Figure 7.4) that is based on using a breach formation time oti~b)(j(F          .and median breach geometry parameter estimates~dFroehlich (1995a). The breach progression relationship reaches 100% aftetiI'jJ          Iwhich implies that the breach .evelopment is cornplete at that time. However, the simulated breach flow rate is about 'j)7)F) /cfs at
[()7)(F) Jand therefore the breach size certainly would be growing quite rapidly. A more realistic simulation would require a longer breach development time that would produce a smaller peak breach outflow rate. To address this shortcoming .an adjustment was P AG6E 47
 
VAUIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM developed to obtain an estimate of the mean peak breach flow rate that is consistent with the mean breach formation time forea triangular breach hydrograph with a volume equal to the reservoir volume above the breach bottom (detailed in Section 6.2.8). This adjustment was also applied to the Froehlich (1995a and 2008) methodology to overcome the same shortcoming [see 5) below]. The adjustment relies on the relatively precise knowledge of the volume of the reservoir contents above the breach bottom elevation and the predicted values of the peak breach outflow rate, which of all the breach parameters have the highest R2 values for both the revised Xu and Zhang methodology (R2 = 81%) and the Froehlich (199 5a and 2008) methodology (R2 = 93%).
: 4) Application of Revised Xu and Zhang regression equations to Teton Dam: The revised best exact and best simplified Xu and Zhang equations were applied to the Teton Dam. The median predicted values for the high and medium erodibility categories were averaged, based On an evaluati on by Professor Briaud that Teton Dam erodibility is on the boundary between the high and medium erosion categories. The percent differences between the observed and predicted breach parameters were smaller for most breach parameters compared with those obtained using the original Xu and Zhang (2009) equations. An attempt to evaluate the adjustment procedure for accounting for the inconsistency in predicted breach time summarized in 3) above was found to be problematic because the observed breach time for the Teton Dam is uncharacteristically short due to an unusually sudden breaCh mechanism caused by the large internal void, which has been documented by the Bureau of Reclamation cause evaluation (Osmun 2013).
: 5) Sensitivity of the Jocassee HRR Breach Hydrograph based on Adjusted Revised Xu and Zhang Equations and Adjusted Froehlich (1995a and 2008): Considering the widths of the confidence intervals for both methods, both methods provide fairly similar median and mean estimates. Specifically with the adjusted revised best exact Xu and Zhang methodology, which uses the same breach formation time definition as Froehlich (1995b and 2008),1.and the adjusted Froehflch l995b an*0,*Bodology the mean breach formation time estimates arep      I(        l Jand I                    Ijrespectiveiy. By iteratively changing the orifice and weir coefficients and the breach progression relationship~              as rUn t.anr*Oxmtely match the mean peak breach flow rate estimates oli"j )W "      cfs an* ..            Ifs, for the two methodologies respectivelY.
The resulting breach hydrographs obtained by HDR forea deterministic piping failure of Jocassee Dam are similar to the HRR breach hydrograph (Duke 2013). It is therefore concluded that the use of the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) provide additional support for the conclusion in our February 2013 report (Ehasz and Bowles 2013) that the HRR breach hydrographs are realistic but cOnservative breach hydrographs that have good defendeblity based on the validity of the Xu and Zhang (2009) method, the conservative nature of the mnedian breach parameter              a piping failure mode initiating in the  [(,~
((7F)estimates,      Iresulting in a breach developing in a single direction towards the center of the dam, the deposition of rockfill immediately below the dam, the low erosion category of the rockfill material, the p
P A GE 48v


==8.0 CONCLUSION==
VALIDATION OF HRR BREACH HYOROGRAPH FOR JOCASSEE DAM various characteristics of a modern dam that were included in the design and construction of Jocassee Dam and the time required to drain Lake Jocassee to the breach bottom elevation.
S
: 6) Sensitivity of the Jocassee HRR Breach Hydrograph to a Lower Breach Bottom Elevation: A sensitivity run was performed with the breach bottom elevation set to Elevation 800 feet msi. instead ,of Elevation 870 feet' msl., but with all the other breach parameters unchanged from the HRR breach hydrograph (Duke 2013). Even though this run was performed in a conservative manner, it was concluded that a lower breach bottom would not significantly changethe breach hydrograph.
P AG6E 49w


===8.1 Discuss===
                      . . ..                                     ..   ..   ..           ..- -  -n-l . .
Overall Conclusion The overall conclusion of this report is that the HRR breach hydrographs (Duke 2013), which was based on the original Xu and Zhang (2009) breach parameter regression equations, is a reasonable and conservative estimate of the downstream effects of a deterministic sunny-day breach of the Jocassee Dam. This conclusion is supported by our review of the data on which the Xu and Zhang (.2009) methodology is based, the confirmation of the assignment of a low erosion category to Jocassee Dam, and by comparisons with two additional breach hydrographs that are based on the Froehlich (1995a and 2008) regression equations and the revised Xu and Zhang regression equations in which the agency questions about the original Xu and Zhang (2009) methodology have been addressed.
                -- ,dr VALIDATION OFHRR BRF.A C II YDROGRA PH FOR.JOCASSEE DAM
Both the revised Xu and Zhang and Froehlich (1 995a and 2008) methodologies have been adjusted to allow for sufficient time to drain Lake Jocassee down to the breach bottom elevation (see Section 7.2)The specific conclusions for this report are organized into two parts. In Section 8.2 we summarize our conclusions regarding our responses to the five agency questions.
In Section 8.3 we summarize our conclusions from the review and revision of the Xu and Zhang (2009)methodology and the support that its application and an application of the adjusted Froehlich (1995b and 2008) methodology, to Jocassee Dam provide for the HRR breach hydrographs submitted to the NRC by Duke (2013).8.2 Concluding Responses to Agency Questions 1) Precedence:
Several uses of the Xu and Zhang (2009) ;methodology have been identified in addition to its application to Jocassee Dam. This new methodology seems to be following a pathway to broader acceptance in which its significant advantage over other methods by accounting for the important physical characteristic, Of erodibility is becoming recognized.
The initial questions about the methodology are being addressed, including how to appropriately define and apply failure time estimates in dam breach modeling.2) Chinese case histories:
About 43% of the 75 dam failure case histories on which the Xu and Zhang (2009) methodology is based are for Chinese dams. Our review indicated that Xu and Zhang (2009) did appropriate screening and interpretation of the case history data from all sources, including China; although we identified a few improvements
[see 2 in Section 8:3 belowj. The quality of data for the Chinese case histories appears to be similar to that available for US case histories with more recent breaches; although access to some of this data has been limited outside of China. The poorer construction of Chinese dams built prior to 1977 would be expected to, result in a more erodible dam once a breach process has initiated.
This was appropriately P A GE 45 VALIDATION OF HRR BREA CM HYDROGRAPH FOR JOCASSEE DAM accounted for by assigning a higher erosion category in the Xu and Zhang (2009)
: 3) Representation of case histories for rockfill and other low erodibility dams: The small number of case histories for rockfiUl dams that are classified with low erodibility is a reality that is likely due to the intrinsic safety of such rockfill dams. This limitation applies to all regression methodologies.
However, the inclusion of the Briaud (2008) erosion categories as a control variabl e in the Xu and Zhang (2009) methodology provides a way to account for the important*
influence of the erodibility of materials on breach parameters.
Also, Xu and Zhang (2009) increased the number of case histories by including case histories from China for the Danghe and Gouhou large ro ckfilI dams.4) Use of the Briaud erosion categories:
Professor Briaud's independent review confirmed the following:
! Theappropriateness of using his erosion categories in the Xu and Zhang (2009)methodology.
* The Xu and Zhang (2009) two-step procedure for assigning low, medium or high erosion categories to case history dams is consistent with' his research findings: i) an initial categorization as a range based on the soil type within the dam as low to medium erodibility for rockfill and clay and medium to high erodibility for silt, ,and sand; and ii) an up or down adjustment in the initial range based on construction quality, particularly compaction effort, that, is dePendent mainly on the period of construction but also dam cross-sectional geometry and slope surface protection.
In a few cases erosion categories were changed as summarized in 2 in Section 8.3 below.* The assignment of a low erosion category for Jocassee Dam was confirmed through a conservative analysis of the erosion rates for cross-section materials based on both velocity and shear stress.5) Breach time definition:
The definition of breach time used by Xu and Zhang (2009)includes both a part of the breach initiation process in addition to the breach formation process unlike other regression methods (e.g. Froehlich 1 995b and 2008) that include only the latter. We found that this difference in definitions is of no concern as long as it is appropriately accounted for in using the predicted breach time in a way that is consistent with the HEC-RAS model definitions.


===8.3 Concluding===
==9.0    REFERENCES==


Support for the HRR Breach Hydrograph
Bureau of Reclamation. 1982. Guidelines for defining inundated areas downstream from Bureau of Reclamation dams. Reclamation Planning Instruction Rep. No. 82-11, U.S.
: 1) Agency Concerns:
Dept. of the Interior, Bureau of Reclamation, Denver.
Our review of the agency questions (summarized in Section 8.2)indicates support for the original application of Xu and Zhang (2009) tO estimate breach parameters on Which the HRR breach hydrographs are based; although some improvements to the Xu and. Zhang (2009) data base w ere identified
Bureau of Reclamation. 1988. Downstream hazard classification guidelines. ACER Tech.
[see 2) below]..P AGE 46 SIn association with  VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 2) Revised Xu and Zhang regression equations sensitivity studies: The revised regression equations were developed by Dr. Xu based on the following changes and improvements to the XUi and Zhang (2009) data set:*Changed breach development times to the commonly-used Froehlich (1995b and 2008) definition.
Memorandum Rep. No. 11, U.S. Dept. of the Interior, Bureau of Reclamation, Denver.
This change was seen as a way to predict the duration o~f the breach hydrograph in HEC-RAS; but, as summarized in 3) below, a broader issue with inconsistent "observed" breach times was found that required another step to obtain a reasonable predicted dur ation.* Changed the values of other breach param eters and control variables where they were inconsistent with the Wahl (1998) and FroehliCh (1995a and' b and 2008)data sets with consideration given to reliable information from other, sources.* Changed some assigned erosion categories to include the consideration that compaction associated with construction practices in the US and other developed.
Briaud, J. L. 2008. Case Histories in Soil and Rock Erosion: Woodrow WilsOn Bridge, Brazos River Meander, Normandy Cliffs, and New Orleans, Levees. Journal of Geotechnical and Geoenvironm ental Engineering, 134 (10): 1425-1447.
countries (not China) improved for earthf ill dams after about 1950 and for rockfiht dams after about 1965.* Changed to a higher erosion category where a lower category had been assigned because of long observed failure times but where all other available information pointed to the higher erosion category.' Embankment dams with a core wall or concrete-faced dams that had been assigned to the low erosion category as a means of accounting for the throttling effects of these features on breach development were omitted from the revised data set because their breach parameters would not be representative of low erodibility embankment dams in general.* All Chinese case histories were omitted from the revised data set to avoid the potential criticism that we only had indirect access to the original references for these case histories.
Briaud, J. L. 2013. Jocassee Dam. Report to URS. October 22. (Appendix A of this report)
: 3) InConsistencies between peak breach flows and breach development times: An inconsistency was identified for many case histories in the WahI (1998), Froehlich (1 995a and b and 2008), and XU and Zhang (2009) data sets. Specifically, the;'observed" breach development time is too short to discharge the reservoir contents above the breach bottom and match the "observed" peak breach flow rate. This inconsistency can be clearly seen in the Jocassee Dam breach hydrograph submitted to the NRC by Duke in support of the Safety Evaluation (E) Report (NRC 2011t) (Figure 7.4) that is based on using a breach formation time oti~b)(j(F .and median breach geometry parameter estimates~dFroehlich (1995a). The breach progression relationship reaches 100% aftetiI'jJ Iwhich implies that the breach .evelopment is cornplete at that time. However, the simulated breach flow rate is about 'j)7)F) /cfs at[()7)(F) Jand therefore the breach size certainly would be growing quite rapidly. A more realistic simulation would require a longer breach development time that would produce a smaller peak breach outflow rate. To address this shortcoming .an adjustment was P AG6E 47 VAUIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM developed to obtain an estimate of the mean peak breach flow rate that is consistent with the mean breach formation time forea triangular breach hydrograph with a volume equal to the reservoir volume above the breach bottom (detailed in Section 6.2.8). This adjustment was also applied to the Froehlich (1 995a and 2008) methodology to overcome the same shortcoming
Brunner, G.W.         2011. Hydraulic Model Development for Dam Break Studies.                Hydrologic Engineering Center, U.S. Army Corps of Engineer~s. March.
[see 5) below]. The adjustment relies on the relatively precise knowledge of the volume of the reservoir contents above the breach bottom elevation and the predicted values of the peak breach outflow rate, which of all the breach parameters have the highest R 2 values for both the revised Xu and Zhang methodology (R 2 = 81%) and the Froehlich (199 5a and 2008) methodology (R 2 = 93%).4) Application of Revised Xu and Zhang regression equations to Teton Dam: The revised best exact and best simplified Xu and Zhang equations were applied to the Teton Dam. The median predicted values for the high and medium erodibility categories were averaged, based On an evaluati on by Professor Briaud that Teton Dam erodibility is on the boundary between the high and medium erosion categories.
Costa, J.E. 1985. Floods from Dam Failures. U.S Geological Survey Open File Report 85-560, Denver, Colorado. 54p, Duke Energy Company.             2013. Hydrologic Reevaluation Report submitted to the NRC on March 12, 2013.
The percent differences between the observed and predicted breach parameters were smaller for most breach parameters compared with those obtained using the original Xu and Zhang (2009) equations.
Ehasz, J..L. and D.S. Bowles. 2013. Jocassee and Keowee Dams Breach Parameter Review.
An attempt to evaluate the adjustment procedure for accounting for the inconsistency in predicted breach time summarized in 3) above was found to be problematic because the observed breach time for the Teton Dam is uncharacteristically short due to an unusually sudden breaCh mechanism caused by the large internal void, which has been documented by the Bureau of Reclamation cause evaluation (Osmun 2013).5) Sensitivity of the Jocassee HRR Breach Hydrograph based on Adjusted Revised Xu and Zhang Equations and Adjusted Froehlich (1995a and 2008): Considering the widths of the confidence intervals for both methods, both methods provide fairly similar median and mean estimates.
Report for Duke Energy by URS Civil Construction & Mining and RAC Engineers &
Specifically with the adjusted revised best exact Xu and Zhang methodology, which uses the same breach formation time definition as Froehlich (1995b and 2008),1.and the adjusted Froehflch l995b the mean breach formation time estimates arep I( l Jand I Ij respectiveiy.
Economists. February.
By iteratively changing the orifice and weir coefficients and the breach progression relationship~
Evans, S. G. 1986. 'The maximum discharge~ of outburst floods caused by the breaching of man-made and natural dams. Canadian Geotechni cal Journal, 23(4) :385-387.
as rUn match the mean peak breach flow rate estimates oli"j )W " cfs .. Ifs, for the two methodologies respectivelY.
Fell, R., Wan, C.F., Cyganiewicz, J. and Foster, M. 2003. Time for Development of Internal Erosion arid Piping in Embankment Dams.                     Journal of Geotechnical and Geoenvironm ental Engineering, 129 (4):307-3 14.
The resulting breach hydrographs obtained by HDR forea deterministic piping failure of Jocassee Dam are similar to the HRR breach hydrograph (Duke 2013). It is therefore concluded that the use of the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) provide additional support for the conclusion in our February 2013 report (Ehasz and Bowles 2013) that the HRR breach hydrographs are realistic but cOnservative breach hydrographs that have good defendeblity based on the validity of the Xu and Zhang (2009) method, the conservative nature of the mnedian breach parameter
Franca, M.J. and A.B. Almeida. 2002. Experimental tests on rockfill dam breaching procpss.
((7F)estimates, a piping failure mode initiating in the [(,~ Iresulting in a breach developing in a single direction towards the center of the dam, the deposition of rockfill immediately below the dam, the low erosion category of the rockfill material, the p P A GE 48v VALIDATION OF HRR BREACH HYOROGRAPH FOR JOCASSEE DAM various characteristics of a modern dam that were included in the design and construction of Jocassee Dam and the time required to drain Lake Jocassee to the breach bottom elevation.
Proc. Intern. Syrup. on Hydraulic and Hydrological Aspects of Reliability and Safety Assessment of Hydraulic Structures, St. Petersburg, Russia.
: 6) Sensitivity of the Jocassee HRR Breach Hydrograph to a Lower Breach Bottom Elevation:
P A 6E 50
A sensitivity run was performed with the breach bottom elevation set to Elevation 800 feet msi. instead ,of Elevation 870 feet' msl., but with all the other breach parameters unchanged from the HRR breach hydrograph (Duke 2013). Even though this run was performed in a conservative manner, it was concluded that a lower breach bottom would not significantly changethe breach hydrograph.
P AG6E 49w
.... .. .. .. ..- --n ..-l--,dr VALIDATION OF HRR BRF.A C II YDROGRA PH FOR.JOCASSEE DAM


==9.0 REFERENCES==
uoL:zr...-:-        ra..:      ~fn~r~o
                                .              /tf      '  JInptJc        cer-  r  N    Y  - -..... ---- --
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Froehlich, D.C. 1995a. .Embankment* dam breach parameters revisited.                      Proc., Water Resources Engineering, 1995 ASCE Conf. on Water Resources' Engineering, ASCE, NY, 887;-891.
Froehlich, DC. 1995b. Peak outflow from breached embankment dam.                    J. Water Resour.
Plann. Manage., 121(1):90--9 7.
Froehiich, D.C. 2008. Embankment Dam. Breach Parameters and Their Uncertainties. Journal of Hydraulic .Engineeding, 134(112):1 708-1721.
Haan, C.T. 1977. Statistical Methods in Hydrology. iowa State University Press.
HR Wallingford. 2012. AREBA (A Rapid Embankment Breach Assessment), Breach size                          -
rapid methods of assessment. http://www.hrwallingford.comlproiects/breach-size-rapid-methods-of-assesSment. Accessed January 26, 2014.
.HR Wallingford. 2014. Small Reservoirs Simplified Risk Assessment Methodology: Research Modelling Report. Final report to Defra and Environment. Agency Flood ,and Coastal Erosion Risk Management Research and .Development Programme, Project FD2658.
January.
MacDonald, T.C., and J. Langridge-Monopolis.                1984. Breachi~ng characteristics of dam failures. J5.Hydraul. Eng., 110(5):567-586.
Mohamed, M.A.A. 2002. Embankment breach formation and modelling methods. The Open Universit, England, UK.. April.
Nuclear Regulatory Commission (NRC). 2011. "Staff Assessment of Duke's Response. to Confirmatory Action Letter .Regarding Duke's Commitments to Address External Flooding Concerns at the Oconee Nuclear Station, Units. 1, 2, and .3 (ONS) (TAG Nos.
ME3065, ME3066, and ME3067)". January 28.
Osum, D. 2013. Teton Dam Failure:: A Review* of the Technical Factors Contributing to the Failure.. Presentation to the Ass ociation of Engineering Geologists. May.
Reclamation-USACE-URS-UNSW. 2008. Piping* and Seepage Toolbox.
Soil Conservation Service. 1981. Simplified dam-breach routing, procedure. U. S. Department of Agriculture, Technical Release 66, Washington,. D.C., 25 p. plus appendix.
Singh, VP. 1996. Dam breach modelling technology. Kluwer Academic, Boston.
P A GE 51-


Bureau of Reclamation.
VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM Ru, N.H. and Y.G. Niu. 2001. Embankment dam         - incidents and safety of large dams. Water Power Press, Beijing. [in Chinese.]
1982. Guidelines for defining inundated areas downstream from Bureau of Reclamation dams. Reclamation Planning Instruction Rep. No. 82-11, U.S.Dept. of the Interior, Bureau of Reclamation, Denver.Bureau of Reclamation.
Sowers, G.F. 1987. Jocassee Main Dam Design, Construction and Performance. Report to Design Engineering Departm ent, Duke Power Company, Charlotte, North Carolina. April.
1988. Downstream hazard classification guidelines.
Von Thun, J.L., and D.R. Gillette.         1990. Guidance on breach parameters.         Internal Memorandum, U.S. Dept. of the Interior,. Bureau of Reclamation, Denver.
ACER Tech.Memorandum Rep. No. 11, U.S. Dept. of the Interior, Bureau of Reclamation, Denver.Briaud, J. L. 2008. Case Histories in Soil and Rock Erosion: Woodrow WilsOn Bridge, Brazos River Meander, Normandy Cliffs, and New Orleans, Levees. Journal of Geotechnical and Geoenvironm ental Engineering, 134 (10): 1425-1447.
Wahi, T. L. 1998. Prediction of Embankment Dam Breach Parameters - A Literature Review and Needs AssesSment. Dam Safety Report No. DSO-98-004, U.S. Department of the Interior, Bureau of Reclamation, Denver, Colorado.
Briaud, J. L. 2013. Jocassee Dam. Report to URS. October 22. (Appendix A of this report)Brunner, G.W. 2011. Hydraulic Model Development for Dam Break Studies. Hydrologic Engineering Center, U.S. Army Corps of Engineer~s.
Wahi, T.L. 2004. Uncertainty of Predictions of Embankment Dam Breach Parameters. ASCE Journal of Hydraulic Engineering, Vol. 130, No. 5, May 1.
March.Costa, J.E. 1985. Floods from Dam Failures.
Wahl, T.L. 2012. Several verbal discussions with J.L. Ehasz regarding the use of the Xu and Zhang (2009) technical paper as well as verbal discussions of erodibility factors as related to rockfill dams.
U.S Geological Survey Open File Report 85-560, Denver, Colorado.
Wahl, T.L. 2013. Incorporating Breach Parameter Estimation and Physically-Based Dam Breach Modeling into Probabilistic Dam Failure Analysis. Presented at the NRC Interagency Workshop on Probabilistic Flood Haz ard Assessment. January 30.
54p, Duke Energy Company. 2013. Hydrologic Reevaluation Report submitted to the NRC on March 12, 2013.Ehasz, J..L. and D.S. Bowles. 2013. Jocassee and Keowee Dams Breach Parameter Review.Report for Duke Energy by URS Civil Construction
Walder, J.S., and J.E. O'Connor. 1997. Methods for predicting peak discharge of floods caused by failure of natural and constructed earth dams. Water Resour. Res.,
& Mining and RAC Engineers
33(10):2337-2348.
&Economists.
Wan, C.F., and R. Fell. 2004. Investigation of rate of erosion of soils in embankment dams. J.
February.Evans, S. G. 1986. 'The maximum discharge~
Geotech. Geoenviron. Eng., 130(4):373 -380.
of outburst floods caused by the breaching of man-made and natural dams. Canadian Geotechni cal Journal, 23(4) :385-387.Fell, R., Wan, C.F., Cyganiewicz, J. and Foster, M. 2003. Time for Development of Internal Erosion arid Piping in Embankment Dams. Journal of Geotechnical and Geoenvironm ental Engineering, 129 (4):307-3 14.Franca, M.J. and A.B. Almeida. 2002. Experimental tests on rockfill dam breaching procpss.Proc. Intern. Syrup. on Hydraulic and Hydrological Aspects of Reliability and Safety Assessment of Hydraulic Structures, St. Petersburg, Russia.P A 6E 50 uoL:zr...-:-
Xu, Y. and Zhang, L.M. 2009. Breaching Parameters for Earth and Rockfill Dams. Journal of Geotechnical and Geoenvironmental Engineering, 135( 12): 1957-1970.
ra..: .~fn~r~o /tf ' JInptJc cer- r N --.Y .... -- -- --VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Froehlich, D.C. 1995a. .Embankment*
dam breach parameters revisited.
Proc., Water Resources Engineering, 1995 ASCE Conf. on Water Resources' Engineering, ASCE, NY, 887;-891.Froehlich, DC. 1995b. Peak outflow from breached embankment dam. J. Water Resour.Plann. Manage., 121(1):90--9 7.Froehiich, D.C. 2008. Embankment Dam. Breach Parameters and Their Uncertainties.
Journal of Hydraulic .Engineeding, 134(1 12):1 708-1721.Haan, C.T. 1977. Statistical Methods in Hydrology.
iowa State University Press.HR Wallingford.
2012. AREBA (A Rapid Embankment Breach Assessment), Breach size -rapid methods of assessment.
http://www.hrwallingford.comlproiects/breach-size-rapid-methods-of-assesSment.
Accessed January 26, 2014..HR Wallingford.
2014. Small Reservoirs Simplified Risk Assessment Methodology:
Research Modelling Report. Final report to Defra and Environment.
Agency Flood ,and Coastal Erosion Risk Management Research and .Development Programme, Project FD2658.January.MacDonald, T.C., and J. Langridge-Monopolis.
1984. Breachi~ng characteristics of dam failures.
J5. Hydraul. Eng., 110(5):567-586.
Mohamed, M.A.A. 2002. Embankment breach formation and modelling methods. The Open Universit, England, UK.. April.Nuclear Regulatory Commission (NRC). 2011. "Staff Assessment of Duke's Response.
to Confirmatory Action Letter .Regarding Duke's Commitments to Address External Flooding Concerns at the Oconee Nuclear Station, Units. 1, 2, and .3 (ONS) (TAG Nos.ME3065, ME3066, and ME3067)".
January 28.Osum, D. 2013. Teton Dam Failure::
A Review* of the Technical Factors Contributing to the Failure..
Presentation to the Ass ociation of Engineering Geologists.
May.Reclamation-USACE-URS-UNSW.
2008. Piping* and Seepage Toolbox.Soil Conservation Service. 1981. Simplified dam-breach routing, procedure.
U. S. Department of Agriculture, Technical Release 66, Washington,.
D.C., 25 p. plus appendix.Singh, VP. 1996. Dam breach modelling technology.
Kluwer Academic, Boston.P A GE 51-VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM Ru, N.H. and Y.G. Niu. 2001. Embankment dam -incidents and safety of large dams. Water Power Press, Beijing. [in Chinese.]Sowers, G.F. 1987. Jocassee Main Dam Design, Construction and Performance.
Report to Design Engineering Departm ent, Duke Power Company, Charlotte, North Carolina.
April.Von Thun, J.L., and D.R. Gillette.
1990. Guidance on breach parameters.
Internal Memorandum, U.S. Dept. of the Interior,.
Bureau of Reclamation, Denver.Wahi, T. L. 1998. Prediction of Embankment Dam Breach Parameters  
-A Literature Review and Needs AssesSment.
Dam Safety Report No. DSO-98-004, U.S. Department of the Interior, Bureau of Reclamation, Denver, Colorado.Wahi, T.L. 2004. Uncertainty of Predictions of Embankment Dam Breach Parameters.
ASCE Journal of Hydraulic Engineering, Vol. 130, No. 5, May 1.Wahl, T.L. 2012. Several verbal discussions with J.L. Ehasz regarding the use of the Xu and Zhang (2009) technical paper as well as verbal discussions of erodibility factors as related to rockfill dams.Wahl, T.L. 2013. Incorporating Breach Parameter Estimation and Physically-Based Dam Breach Modeling into Probabilistic Dam Failure Analysis.
Presented at the NRC Interagency Workshop on Probabilistic Flood Haz ard Assessment.
January 30.Walder, J.S., and J.E. O'Connor.
1997. Methods for predicting peak discharge of floods caused by failure of natural and constructed earth dams. Water Resour. Res., 33(10):2337-2348.
Wan, C.F., and R. Fell. 2004. Investigation of rate of erosion of soils in embankment dams. J.Geotech. Geoenviron.
Eng., 130(4):373  
-380.Xu, Y. and Zhang, L.M. 2009. Breaching Parameters for Earth and Rockfill Dams. Journal of Geotechnical and Geoenvironmental Engineering, 135( 12): 1957-1970.
Xu, Y. 2010. Analysis of Dam Failures and Diagnosis of Distresses for Dam Rehabilitation.
Xu, Y. 2010. Analysis of Dam Failures and Diagnosis of Distresses for Dam Rehabilitation.
Ph.D. Thesis. The Hong Kong U niversity of Science and Technology.
Ph.D. Thesis. The Hong Kong U niversity of Science and Technology. January.
January.PAGE 52"  
PAGE 52"
...... r Appendices Jocassee Dam Validation of HRR Breach Hydrograph for Jocassee Dam  
 
~,;aLp ~ ~ ;,Ipuuflp(;uu, -~ ~ ~ IPJ i...rri £.QUU(UJ Appendix A Briaud's Report Appendix A JOCASSEE DAM 17 January 2014 Report to UJRS Prepared by: Professor Jean-louis BRIAUDI PhD., PE 4 Fig. 1 -Jocassee Dam 1. MEETING LOGISTICS A meeting took place at the Jocassee Darn in South Carolina on 3 and 4 October 2013. The purpose of the meeting was to evaluate the erosion characteristics of the Jocassee Dam, which forms a large storage reservoir 12 miles upstream of Duke Energy's Oconee Nuclear Power Plant Complex near Salem, South Carolina.The primary attendees were Dean Hubbard and Adam Johnson from Duke Energy; Chris Ey from HDR and Joe Ehasz from 2. MEETING PURPOSE The primary purpose of the meeting and field trip was to become familiar with the Jocassee Dam and materials and address the following questions:
...... r Appendices Jocassee Dam Validation of HRR Breach Hydrograph for Jocassee Dam
* Is your (Briaud) work applicable to embankment dam erosion?* What is your (Briaud) characterization of Jocassee dam erosion characteristics?
 
PageA-I Appendix A* Please comment on Xu and Zhang work on dam breach, and how the three erodibility classifications, used by Xu & Zhang, compare to your six classifications.
~,;aLp ~ ~ ;,Ipuuflp(;uu, - ~ ~     ~       IPJ i...rri £.QUU(UJ Appendix A Briaud's Report
Important background details on soil erosion and rock erosion arc given in the Appendix.3. IS YOUR (B3RIAUD)
 
WORK APPICABLE TO EMBANKMENT EROSION?The short answer is yes as long as the limitations listed below arc kept in mind; the work also has significant advantages also listed below. My work (B~riaud, 2008) is described in the background section of this report (Appendix).
Appendix A JOCASSEE DAM 17 January 2014 Report to UJRS Prepared by: Professor Jean-louis BRIAUDI PhD., PE 4
Of particular interest for Jocassee Dam are the charts shown below relating the critical velocity Ve to the mean grain size D50, the critical shear stress rc to the mean grain size D50, the erosion rate dz/dt to the velocity V, and the erosion rate dz/dt to the shear stress r. These charts are repeated below for convenience (Fig. 31, 32, 33, 34). These charts were developed on the basis of EFA testing (Appendix Section c, Fig. 5). This apparatus reproduces the erosion process at the element level where the water is flowing parallel to the interface.
Fig. 1 - Jocassee Dam
Thle charts were developed from hundreds of EFA tests on vastly different soil types over the last 20 years. The advantages and limitations of the applicability of these charts are listed below Limitationis:
: 1. MEETING LOGISTICS A meeting took place at the Jocassee Darn in South Carolina on 3 and 4 October 2013. The purpose of the meeting was to evaluate the erosion characteristics of the Jocassee Dam, which forms a large storage reservoir 12 miles upstream of Duke Energy's Oconee Nuclear Power Plant Complex near Salem, South Carolina.
The primary attendees were Dean Hubbard and Adam Johnson from Duke Energy; Chris Ey from HDR and Joe Ehasz from UR*S.
: 2. MEETING PURPOSE The primary purpose of the meeting and field trip was to become familiar with the Jocassee Dam and materials and address the following questions:
* Is your (Briaud) work applicable to embankment dam erosion?
* What is your (Briaud) characterization of Jocassee dam erosion characteristics?
PageA-I
 
Appendix A
* Please comment on Xu and Zhang work on dam breach, and how the three erodibility classifications, used by Xu & Zhang, compare to your six classifications.
Important background details on soil erosion and rock erosion arc given in the Appendix.
: 3. IS YOUR (B3RIAUD) WORK APPICABLE TO EMBANKMENT EROSION?
The short answer is yes as long as the limitations listed below arc kept in mind; the work also has significant advantages also listed below. My work (B~riaud, 2008) is described in the background section of this report (Appendix). Of particular interest for Jocassee Dam are the charts shown below relating the critical velocity Ve to the mean grain size D50, the critical shear stress rc to the mean grain size D50, the erosion rate dz/dt to the velocity V, and the erosion rate dz/dt to the shear stress r. These charts are repeated below for convenience (Fig. 31, 32, 33, 34). These charts were developed on the basis of EFA testing (Appendix Section c, Fig. 5). This apparatus reproduces the erosion process at the element level where the water is flowing parallel to the interface. Thle charts were developed from hundreds of EFA tests on vastly different soil types over the last 20 years. The advantages and limitations of the applicability of these charts are listed below Limitationis:
: a. The soils tested over the last 20 years were soils that could be sampled in a 3 inch diameter Shelby tube or re-compacted in a 3 inch Shelby tube to match the site condition.
: a. The soils tested over the last 20 years were soils that could be sampled in a 3 inch diameter Shelby tube or re-compacted in a 3 inch Shelby tube to match the site condition.
The largest grain size that was tested was about 7 mm diameter gravel. For soils particles larger than that, the charts are based on published work by others including the US Arm)'Corps of Engineers for example.b. The Erosion Function Apparatus (EFA) reproduces a flow where the water is flowing parallel to the soil surface at the element level. Therefore using the EFA results for other flow conditions should be done with caution and with engineering judgment.A dvan~tag~es:
The largest grain size that was tested was about 7 mm diameter gravel. For soils particles larger than that, the charts are based on published work by others including the US Arm)'
: a. The work is characterizing the behavior of the soil at the element level so it is broadly applicable to many erosion situations, including soil and rockfill materials used in embankment dams. The measured function called the erosion function is to erosion studies what the stress strain curve is to deformation problems.
Corps of Engineers for example.
It is a constitutive equation which can be used in numerical method as easily as in simple hand calculations.
: b. The Erosion Function Apparatus (EFA) reproduces a flow where the water is flowing parallel to the soil surface at the element level. Therefore using the EFA results for other flow conditions should be done with caution and with engineering judgment.
: b. The wvork is very useful in the case of fine grained soils wvhere the erodibility is not related to the grain size.c. The work includes the critical velocity or critical shear stress for coarse grained soils and rockfill based on an NCHRP project (Lagasse et al., 2006) which identified the USAGE equation as being the best among others. This equation is Eq. 8 in the Appendix for predicting the required size given a velocity.
A dvan~tag~es:
The critical velocity charts for large rock fill blocks have this solid background and are applicable to soil materials and rockfills used in embankment dams.d. The EFA tests which form the basis for these charts has been used to predict several erosion processes in many materials.
: a. The work is characterizing the behavior of the soil at the element level so it is broadly applicable to many erosion situations, including soil and rockfill materials used in embankment dams. The measured function called the erosion function is to erosion studies what the stress strain curve is to deformation problems. It is a constitutive equation which can be used in numerical method as easily as in simple hand calculations.
One example is the erosion that occurs in frnee grained and coarse grained soils around bridge supports as a function of time; Fig. 35 Page A-2  
: b. The wvork is very useful in the case of fine grained soils wvhere the erodibility is not related to the grain size.
&.....l. v3 L.uww .....J.,i.I -- Ilull V :U i..V.. ..rn.inl ms --v 3 n £urn A"p. .e.. ... A- shows the precision obtained in this case. Other examples of applications include levee overtopping and meander migration in rivers.INTACI RIP-RAP&ROCK CLAY SILT [~~] ~ ~ ROCK.~ I 100 CRITICAI.VELOCITY.
: c. The work includes the critical velocity or critical shear stress for coarse grained soils and rockfill based on an NCHRP project (Lagasse et al., 2006) which identified the USAGE equation as being the best among others. This equation is Eq. 8 in the Appendix for predicting the required size given a velocity. The critical velocity charts for large rock fill blocks have this solid background and are applicable to soil materials and rockfills used in embankment dams.
10 (m/s,) I 0A1 0.01/ US ARMY CORPS OF FNGINEERS EM 1601 ea Vc=O" i(Dso)-02 V
: d. The EFA tests which form the basis for these charts has been used to predict several erosion processes in many materials. One example is the erosion that occurs in frnee grained and coarse grained soils around bridge supports as a function of time; Fig. 35 Page A-2
45"t 0.0001 0,001 0.01 0.1 1 1 0 I00 I000 10000 MEAN GRINA SIZE. (ra) JOINT SPACING FOR JOINTED ROCK* TMU 0mb ma vaoaebd Iy Iblaud. 4.4.. eta. 2be1, bada. PwNa.
 
i o A1l 0~ mb .pa.tab by bln*dk. 4.,4. (MU).m1o TodaS on -Nw Odlaain Lawn sa..*L dahd~ aumy, MWU., SLmit. WW ,wmetd yvnel .A.a. 17 Fig. 31 -Critical velocity as a function of mean grain size (Briaud, 2013).__ ___ IUP-RAP &L~QROC~j CLAY SILT ~ GRAVEL JOINTED ROCK CRITICA SI-WAR STRESS, (N/mn 2)100000 100 I01 001 US ARMY CORPS OF11-0.0S~5 (D)-4 BY SHIELDS (1936)I 0010001 00O ! 001 1l 10I 100 1000 I0000 MFEAN GRAIN SlEP Ds (rm JOINT SPACING FOR JOINE ROCK e T~ltD Dab aa rapoanad by 5lel .1.4. 4.4..L (MIS). -iabdaeab  
D*..L  &.....l.       v3                   L.uww     .....J.,i.I     -- Ilull         V       :U i..V..   .. rn.inl     ms       *    -   -       3v  n   £urn
.Ma OAslm~~ Law.Sa Dab Dar Sa Camay. UAS.Wlb, bmt WW a. rapa~bd by Vanaud. V.A..ad. (1gr5)..maulk~Matn Mae "da AWE aaNmmI.N. i N. oaa m pme.e, ABS.Maw Vail..Fig. 32 -Critical shear stress as a function of mean grain size (Briaud, 2013)Pge A-3 Inn i ii iIi iii in iii iiii 1m n iiii iiiii ... .... .... ....... .... .. ......
                                                                                                                                                  . A"p.. e..
-- vTtrw, IWm, Iv  Appendix A 1000-EROSION RATE (mmr/hr)100-10-!-0.1/ High MedlIn Very High Erodiblility Eod~iblilty Erodibility  
                                                                                                                                                              .. A-
!1 n /,di- m san /knc Rolnl"-N~-pan Slt-Fin Cirvel Erodiblbty-o.Platicity (2ih -Jomni Rock-All ssrd 3-0mmSang Plasncuy>
* shows the precision obtained in this case. Other examples of applications include levee overtopping and meander migration in rivers.
Very Low Inc-r-aIe in at-/s-Jointed Rock Vddol) rdbit (cla) / (I+0-I500 mm" Spacng)SP MLi ML H // -Euu"/-L % Rc ock V Lw 0.1 1.0 10 I00 VELOCITY (mis)Fig. 33 -Proposed erosion categories for soils and rocks based on velocity (Iriaud, 2013).100000 I0000 1000-EROSION RATE '00 (mmn/hr)10-0.1 Very High High Erodibility Erodibility  
INTACI                                                                                 RIP-RAP&
/ Medium-I Im + ErudIbIlt-o-pasclt*
ROCK                   CLAY             SILT           [~~] ~                       ~         ROCK
Sit -Lov, PzAsticsr, Silt LOW* , t~ 3r'm Erodlbil-Htpf Silt~ o-I. Phiaan~ity Clla / -l0- nu0 Sp ciq)--Cobbles-Increase a C~ctio / PlagiCti5 SM (.,+. 'oiii 34Rc-increase ia Wme MLii CL iCH/ ->, Ilty Very Low Erodibilty V Non-Erosive V!0 I I0 100 10g0 10000 100000 SHEAR STRESS (Pa)Fig. 34 -Proposed erosion categories for soils and rocks based on shear stress (Briaud, 2013).Page A-4 Appendix A* Pier 3W[- o Pier 4E.3 -* Pier 5E o0 Pier 23E*A Pier 24E< A Pier 25Ej v Pier 26E1 Pier 27EPier 28E________________
                              .~     I                                                                                                     "t
_Pier_29E 0o1 2 3 4.MEASURED LOCA L SCOUR DEPTH (in)Fig.35 -Measured vs. predicted scour depth at Woodrow Wilson bridge (Briaud, 2008).4. CHARACTERIZE JOCASSE DAM.In order to evaluate the erosion function of the Jocassee Dam, the following process was used.a. A cross section of the darn was drawn (Fig. 36).b. An erosion category was chosen for each material wvithin the dam (Table 3); since the drawings specified that the D 5 o was the minimum allowed, this selection is conservative.
                                                                                /                      US ARMY CORPS OF 100                                                                  FNGINEERS EM 1601 CRITICAI.
: c. Three erosion levels were placed across the dam as shown on Fig. 36: level AA, BB, and CC.d. For each level, a weighted average of the erosion category was determined according to the length of material exposed to the flow for that level.Z2:-1 Li Where EC is the average erosion category, Li is the length of material i exposed to water, and ECi is the erosion category for material i.e. Section AA gave an EC value of 3.93, section BB gave 4.08, and section CC gave 4.11.f. Therefore, the overall average erosion category for Jocassee dam is clearly 4 or low erod ibi Iity.Page A-5 L.tJpj~rU55.~, ~ ~ I5iJtIIi.~U(JlI  
VELOCITY. 10                                                   ea (m/s,)           I 0A1                               Vc=O" i(Dso)-02                               V =0.351D*o)0 45 0.01 0.0001 0,001             0.01       0.1           1         10      I00   I000 10000 MEAN GRINA               SIZE. D*0 (ra)             JOINT SPACING FOR JOINTED ROCK
-VliILIIIIUIU
* TMU 0mb ma vaoaebd Iy Iblaud. 4.4.. eta.                 2be1,   bada.     PwNa. A.,awo*ababri o A1l   0~ mb
....... j Appendix A Fig. 36- Cross section of Jocassee Dam..Table 3 -Description of soil and rock materials in Jocassee Dam and erosion category Material (Fig. 36)Rock fill Description Estimated critical velocity (mn/Erosion Category:b)(7)(F)Impervious core Random fill Filters A similar set of calculations were performed for the Teton dam. Fig. 37 shows the Teton Dam cross section and the three levels selected for calculating the weighted average erosion category for the Teton Dam. Table 4 shows the dam materials and their erosion categories.
                                          .pa.tab           by bln*dk. 4.,4. (MU).m1o               TodaS on-Nw     Odlaain Lawn sa..*L dahd~ aumy,           MWU., SLmit. WW               ,wmetd         yvnel       .A.a. 17 Fig. 31     -   Critical velocity as a function of mean grain size (Briaud, 2013).
These erosion categories were estimated based upon the material description in Seed and Duncan (1981). The calculations indicate that the weighted average of the erosion category according to the length of material exposed for that level are: Section AA gave an EC value of 2.5, section BB gave 2.63, and section CC gave 2.7. The average erosion category of Teton dam is therefore estimated to be 2.6 or medium to high erodibility (Fig. 38).If the Teton Dam failure took 4 hours for an erosion category of 2.6 (medium to high erodibility), and considering that the erosion categories are based on a log scale, it is clear that a Jocassee Dam failure which has an erosion category of 4 (low erodibility) would take much longer.Page A-6  
__                                               ___             IUP-RAP &
~.Uf1EWUfl5  
L~QROC~j                       CLAY             SILT             ~             GRAVEL JOINTED ROCK 100000 US ARMY CORPS OF11 CRITICA*L SI-WAR STRESS,             100 2
~U Univ .ZWFFUUVW UJUILiY UEIWI5LWI  
(N/mn   )
-WE5lwI~~a  
I01
,, wg. .....~,fl.. .AL........~  
                                                                      -0.0S~(D)-4 5                                  BY SHIELDS (1936) 001 I
--- IC OfT? fl.iflOidi A.. .....i A -Mink WS E E334 A A.c-SC~E 30011 20011 1001 0*El 5232 IA. 5132m --B lh Fig. 37 -Cross section of Teton Dam.Table 3 -Description of soil and rock materials in Teton Dinm and erosion category JO Material (Fig. Description Estimated critical velocity Erosion 37) ______________(m/s)
0010001           00O001!                       1l       10I 100 1000 I0000 MFEAN GRAIN SlEP Ds (rm JOINT SPACING FOR JOINE ROCK e   T~ltD Dab aa rapoanad by 5lel               4.4..L
Category Zone I (Core) Silt with some clay, sand, and 0.2 2 gravel ___________________
                                                                    .1.4.         (MIS).       -iabdaeab . Ma       OAslm~~Law.
Zone 2 Selected sand, gravel and 1 3.1!_____________
Sa     Dab Dar Sa           Camay. UAS.Wlb,             bmt WW         a. rapa~bd       by Vanaud. V.A..ad. (1gr5).
cobbles ___________________
                                .maulk~Matn     Mae             "da AWE aaNmmI.N.           I*      i oaa N.           m   pme.e, ABS.
Zone 3 Miscellaneous fill 0.5? 2.5 Zone 4 Selected silt, sand, gravel, and 0.8 3 cobbles ___________________
Maw Vail..
Zone 5 Rockfiil 2 4 TETON DAMi 10O0W Ver Hgh ig Medium J(OCASSEE Erdbiiy Erodibilhty Ero~dtbilhty D)ANIp 10000 Er-diblhity II EROSION ,.S/.,...
Fig. 32 - Critical shear stress as a function of mean grain size (Briaud, 2013)
io RATE 100 -- .. ,, (mm/br) '" Very Low NI LI Rock\ 0.1(1 0.1 1.0 10 lOS VELOCITY (mis)Fig. 38 -Overall erosion category for Jocassee and Teton Dams (velocity based).PageA-7  
Pge A-3
..................................................................
 
m_.__...... r" .....A....... A~neoooo ~ t HI FEud IOO EROSION RATE 100 (mm/br)TETON flAM *-Uae.i(WASEE 1gb IlbUily Medium I)AM II Erediblity III IA E V I I.~t. P1441b ~III .,,~d H, 1.'.. PIs.'~.#'
*li*
4 U, '~ %f4fl~~* 'u" Very Low~ ~ U 4"" FrodIbIIity 441~ nfl Nom-Erosi, Rock *Iq ~ VI Ira fl*SP 0.1/NILJ C C'0 1 10 100 100 I000 I000 SHEAR STRESS (Pa)Figl. 39 -Overall erosion category for Jocassee and Teton Dams (shear stress based).S. COMMENT ON THE CHOICE OF ERODIBILITY OF XU AND ZHANG and HOW THE ThREE ERODIBILITY CLASSIFICATIONS, USED BY XU & ZHANG, COMPARE TO YOUR SIX CLASSIFICATIONS?.
Inn i ii iIi *T iii v*Jw*w in iii iiii 1m v*f*w*
The work done by Xu and Zhang is very useful as it is based on a database of observations.
n iiii iiiii ...   . .
Since the authors point out that erodibility is the single most important factor, it is critical to understand how they defined the erodibility of the materials making up the dam. The three erodibility classifications used by Xu & Zhang (2009) refer to low, medium, and high erodibility.
EIfWi*Wll*d'q#  ..     -- ....     .
From their publication, it appears that these three category designations correspond to the low (category 4), medium (category 3), and high (category  
vTtrw,wwwl*  ...... iw*Jw IWm,mwwe* *0w*lnu0q*r*oi'eo*p*l
: 2) categories proposed by Briaud (2008).This was verified with the primary author (Yao Xu) durng his visit to Denver, CO in November 2013. The categorization reflects the fact that the types of materials typically used for the construction of earth damns fall into the Briaud erosion categories 2, 3, and 4 with some category 5 materials for rockfill dams. Indeed fine sands and non-plastic silts (Briaud category 1) and jointed and intact rock (Briaud category 6) are not used in eatdam engineering.
                                                                                                                                    .    ...
* Iv  *.. f* *l. .....
Appendix A Very High                          /Erodiblility High                         Eod~iblilty MedlIn Erodibility                               !1 n /,di-           m san             /knc Rolnl"
                                                                -N~-panSlt-Fin                                       Cirvel                     Erodiblbty 1000-
                                                                                                          -o.Platicity (2ih -Jomni           Rock EROSION
                                                                                                              -All   ssrd             3-0mmSang RATE                  100-(mmr/hr)                                                                            co*41-igh                        Plasncuy>             Very Low 10-Inc-r-aIe in     at-/s-Jointed                                               Rock   rdbitVddol)
(cla)                               /                *L/         (I+0-I500 mm" Spacng)
                                            !-          SP MLi                   ML           H                     //                               -Euu"
                                                                                              /-L     %                 Rc                   -Jomt* ock         V Lw 0.1 0.1                                  1.0                                       10                         I00 VELOCITY (mis)
Fig. 33 - Proposed erosion categories for soils and rocks based on velocity (Iriaud, 2013).
100000                 Very       High                     High Erodibility                     Erodibility             /           Medium I0000                            -I             +              Im                       ErudIbIlt
                                                      -o-pasclt       Sit     -Lov, PzAsticsr, Silt             o*R/                                LOW
                                                                                                        *,           t~     *+-
3r'm               ErodlbilIlty 1000-
                                                                                                      -Htpf PlawuilyI* Silt~                   o EROSION                                                                                  -I.       Phiaan~ity Clla /       -l0- nu0 Sp ciq)
                                                                                                            -   1I1fistsur*l        -Cobbles RATE                    '00 (mmn/hr)                                                    -Increase a C~ctio                           /       -Hi* PlagiCti5               Very Low Erodibilty 10-        SM                     (.,+.           'oiii                                           34Rc V
                                                                        -increase ia Wme Non-Erosive MLii             CL iCH/                                                         ->,               V!
0.1 0                I                 I0                 100               10g0           10000     100000 SHEAR STRESS (Pa)
Fig. 34 - Proposed erosion categories for soils and rocks based on shear stress (Briaud, 2013).
Page A-4
 
Appendix A
                                *=
* Pier 3W
[-                                     o Pier 4E
                                . 3         -*                           Pier 5E o0 Pier 23E
                                                                      *A Pier 24E
                                < r*                                  A   Pier 25E j                            v Pier 26E
                              =.1*    1
* Pier 27E
                                                                      *1,* Pier 28E
________________                              _Pier_29E 0o1                  2          3        4.
MEASURED LOCA L SCOUR DEPTH (in)
Fig.35 - Measured vs. predicted scour depth at Woodrow Wilson bridge (Briaud, 2008).
: 4. CHARACTERIZE JOCASSE DAM.
In order to evaluate the erosion function of the Jocassee Dam, the following process was used.
: a. A cross section of the darn was drawn (Fig. 36).
: b. An erosion category was chosen for each material wvithin the dam (Table 3); since the drawings specified that the D5 o was the minimum allowed, this selection is conservative.
: c. Three erosion levels were placed across the dam as shown on Fig. 36: level AA, BB, and CC.
: d. For each level, a weighted average of the erosion category was determined according to the length of material exposed to the flow for that level.
Z2:-1Li Where EC is the average erosion category, Li is the length of material i exposed to water, and ECi is the erosion category for material i.
: e. Section AA gave an EC value of 3.93, section BB gave 4.08, and section CC gave 4.11.
: f. Therefore, the overall average erosion category for Jocassee dam is clearly 4 or low erod ibi Iity.
Page A-5
 
L.tJpj~rU55.~, ~       ~         I5iJtIIi.~U(JlI     - VliILIIIIUIU
              ....... j Appendix A Fig. 36- Cross section of Jocassee Dam..
Table 3 - Description of soil and rock materials in Jocassee Dam and erosion category Material                                                             Estimated critical velocity    Erosion (Fig. 36)                               Description                                   Category (mn/
:b)(7)(F)
Rock fill Impervious core Random fill Filters A similar set of calculations were performed for the Teton dam. Fig. 37 shows the Teton Dam cross section and the three levels selected for calculating the weighted average erosion category for the Teton Dam. Table 4 shows the dam materials and their erosion categories. These erosion categories were estimated based upon the material description in Seed and Duncan (1981). The calculations indicate that the weighted average of the erosion category according to the length of material exposed for that level are: Section AA gave an EC value of 2.5, section BB gave 2.63, and section CC gave 2.7. The average erosion category of Teton dam is therefore estimated to be 2.6 or medium to high erodibility (Fig. 38).
If the Teton Dam failure took 4 hours for an erosion category of 2.6 (medium to high erodibility), and considering that the erosion categories are based on a log scale, it is clear that a Jocassee Dam failure which has an erosion category of 4 (low erodibility) would take much longer.
Page A-6
 
~.Uf1EWUfl5 ~U   Univ .ZWFFUUVW           UJUILiY UEIWI5LWI   - WE5lwI~~a     ,, wg.   .....~,fl.. .AL........~ - --       IC OfT?     fl.iflOidi A.. ..... i A -
SC~E 30011     20011   1001   0*
Mink WS E E334                        *-                           c-A A.
* m                --
El 5232 lh B
IA.5132 JO Fig. 37 - Cross section of Teton Dam.
Table 3 -Description of soil and rock materials in Teton Dinm and erosion category Material (Fig.                         Description                         Estimated critical velocity                           Erosion
: 37)           ______________(m/s)                                                                                       Category Zone I (Core)           Silt with some clay, sand, and                                         0.2                                   2 gravel                         ___________________
Zone 2                 Selected sand, gravel and                                             1                                 3.1!
_____________                     cobbles                         ___________________
Zone 3                       Miscellaneous fill                                           0.5?                                 2.5 Zone 4             Selected silt, sand, gravel, and                                       0.8                                   3 cobbles                         ___________________
Zone 5                                 Rockfiil                                             2                                   4 TETON DAMi 10O0W               Ver Hgh Erdbiiy ig Erodibilhty Medium Ero~dtbilhty J(OCASSEE D)ANIp 10000             Er-diblhity                 II EROSION                                               ,.S/.,...                 io       i*
RATE             100       --             ..                       ,,
(mm/br)                               -iii***              '"                   ,*          -*        Very Low NI       LI                   Rock\           .*,***,,V 0.1(1 0.1                         1.0                       10                       lOS VELOCITY (mis)
Fig. 38 - Overall erosion category for Jocassee and Teton Dams (velocity based).
PageA-7
 
..................................................................                                                                                                             m_.__
                                                                                                              ...... r" .....                                       A.......       A~
TETON flAM
* HI1gb                                                .i(WASEE FEud IlbUily               Medium                       I)AM neoooo ~ ,fol,*  t II                   Erediblity III IA IOO                                                                        E EROSION                                                            I I.~t. P1441b ~III         .,,~d H, V
RATE                      100    -          Uae 1.'.. PIs.'~.#' 4 U,             '~     %f4fl~~
(mm/br)                                                                  *                       'u"               Very Low
                                                                                                                              ~     ~   U 4 441 FrodIbIIity SP
                                                                                      /
NILJ  C
                                                                                                                                          ~           nfl Nom-Erosi, C' 0.1                                              Rock           *Iq       ~                 VI Ira   fl*
0     1       10           100           100             I000           I000 SHEAR STRESS (Pa)
Figl. 39 - Overall erosion category for Jocassee and Teton Dams (shear stress based).
S. COMMENT ON THE CHOICE OF ERODIBILITY OF XU AND ZHANG and HOW THE ThREE ERODIBILITY CLASSIFICATIONS, USED BY XU & ZHANG, COMPARE TO YOUR SIX CLASSIFICATIONS?.
The work done by Xu and Zhang is very useful as it is based on a database of observations. Since the authors point out that erodibility is the single most important factor, it is critical to understand how they defined the erodibility of the materials making up the dam. The three erodibility classifications used by Xu & Zhang (2009) refer to low, medium, and high erodibility.
From their publication, it appears that these three category designations correspond to the low (category 4), medium (category 3), and high (category 2) categories proposed by Briaud (2008).
This was verified with the primary author (Yao Xu) durng his visit to Denver, CO in November 2013. The categorization reflects the fact that the types of materials typically used for the construction of earth damns fall into the Briaud erosion categories 2, 3, and 4 with some category 5 materials for rockfill dams. Indeed fine sands and non-plastic silts (Briaud category 1) and jointed and intact rock (Briaud category 6) are not used in eatdam engineering.
: 6. CONCLUSIONS
: 6. CONCLUSIONS
*The erosion function characterizes the behavior of the soil at the element level so it is broadly applicable to many erosion situations including erosion of materials used in embankment dam construction.
                            *The erosion function characterizes the behavior of the soil at the element level so it is broadly applicable to many erosion situations including erosion of materials used in embankment dam construction. The erosion function is the curve which links the erosion rate to the water velocity or the hydraulic shear stress at the soil-water interface; it is to erosion studies what the stress strain curve is to deformation problems. It is a constitutive Page A-8
The erosion function is the curve which links the erosion rate to the water velocity or the hydraulic shear stress at the soil-water interface; it is to erosion studies what the stress strain curve is to deformation problems.
 
It is a constitutive Page A-8 Append ix A equation wvhich applies to the erosion mechanics of all materials including the materials used in embankment dams and can be applied in numerical methods as easily as in simple hand calculations.
Append ix A equation wvhich applies to the erosion mechanics of all materials including the materials used in embankment dams and can be applied in numerical methods as easily as in simple hand calculations.
* The erosion function starts at the critical velocity or critical shear stress for coarse grained soils and rock fill. The rockfill values are based on an NCH-RP project which identified the USAGE equation as being the best among others. This equation is Eq. 8 in the Appendix which gives the particle size corresponding to a giv'en critical velocity.
* The erosion function starts at the critical velocity or critical shear stress for coarse grained soils and rock fill. The rockfill values are based on an NCH-RP project which identified the USAGE equation as being the best among others. This equation is Eq. 8 in the Appendix which gives the particle size corresponding to a giv'en critical velocity. So the basis of the critical velocity charts for large rock fill blocks has this solid background and therefore applies to embankment dam materials.
So the basis of the critical velocity charts for large rock fill blocks has this solid background and therefore applies to embankment dam materials.
* The erodibility of the Jocassee Dam materials was evaluated; see Figures 38 & 39, and the Jocassee cross-section materials are clearly and conservatively established to be "low erodibility" materials.
* The erodibility of the Jocassee Dam materials was evaluated; see Figures 38 & 39, and the Jocassee cross-section materials are clearly and conservatively established to be "low erodibility" materials.
*The Xu and Zhang regression equations do showv and consider that erodibility is the most significant factor in the development of embankment breach parameters.
      *The Xu and Zhang regression equations do showv and consider that erodibility is the most significant factor in the development of embankment breach parameters. Thus, it is most important, in evaluating their equations, to establish how Xu and Zhang have assigned the "low, medium or high" erodibility to the various dams and data to establish their regression equations. Use of the three classifications is appropriate since they do represent the characteristics of the most commonly used materials for construction of embankment dams.
Thus, it is most important, in evaluating their equations, to establish how Xu and Zhang have assigned the "low, medium or high" erodibility to the various dams and data to establish their regression equations.
: 7. OPTIONS FOR FURTHER STUDY The following options for fuirther study can be pursued to refine the specific erodibility characteristics of the dam materials, and the time necessary to erode Jocassee dam.
Use of the three classifications is appropriate since they do represent the characteristics of the most commonly used materials for construction of embankment dams.7. OPTIONS FOR FURTHER STUDY The following options for fuirther study can be pursued
: a. Nuimerical simulations. The program CHEN 4D can be used to simulate the breach in 4 dimensions (x, y, z, t) together with the erosion functions of the various materials. This will give a much more precise time to total erosion than HEC-RAS which is a one dimensional solution of the problem. Professor Chen and I can team up for simulating the water flow and the soil erosion. Such dam breach simulations are possible as shown on Fig. 40 below. The results would be a movie with timed frames of the darn erosion as a function of time with associated erosion versus time curves. Note that two distinct modes of failure need to be simulated: piping erosion followed by breach as the roof of the dam embankment collapses (e.g.:


..,ph, pI;,l,5i.
Appendix A The solution to many of the internal erosion problems is the use of quality filters. A filter is a layer of soil placed between a fine grained soil and coarse grain soil to transition the flow without having the fines of the fine grained soil erode through the voids of the coarse grained soil. The grain size distribution curve of the soil filter layer is designed to provide this transition in a gradual fine to coarse fashion.
-d; ..,Vs H '..rT' 5..F~ LI(UJ Appendix A Coarse silt and fine sand are among the most erodible soils. Therefore earth dams containing significant amounts of such materials will be more prone to internal erosion. Clays in general and high plasticity clays in particular are more resistant to erosion as long as the electrical bonds between particles are not destroyed by chemicals.
Page A-36
It seems that some core materials of glacial origin such as glacial tills can be particularly susceptible to internal erosion. Sherard gave a range of gradation of soils which can lead to internal erosion problems (Fig. 28).The soils which are most susceptible to suffusion are those where the volume of fines is less than the volume of the voids between coarse particles.
In this case, the fines can move easily between the coarse particles and erode away to an exit face. After suffusion, such soils are devoid of fines and become very pervious clean gravel for example. Fell and Fry again indicate that gap graded soils and coarsely graded soils with a flat tail of fines (Fig. 29) are most susceptible to suffusion.
100 80 PERCENT 60 FINER (%) 40 20 0 ~0.001 0.01 0.1 1 10 GRAIN SIZE, mm 100 1000 Fig. 28 -Range of problems soils for internal erosion (after Sherard, 1979).100 80 60 PERCENT PASSING 40 20 0 '-0.1300 0.01 0.2 I 1o PARTICLE SIZE (ram)! 00 !1000 Fig. 29 -Range of problems soils for suffusion (after Fell and Fry, 2005).Page A-34 Appendix A One of the important criterions to evaluate erosion is to calculate the hydraulic gradient and compare it to the critical gradient.
The critical gradient is given by Values of icr typically vary in the range of 0.85 to I .2. The hydraulic gradient in dams depends on many factors including the difference in water level between the upstream and the dowvnstream, the length of the drainage path, and the relative hydraulic conductivity, of the various zones. The target maximum gradient in the flow must be kept much lower than the critical value especially in areas where internal erosion is possible.
Fig. 30 shows ranges of hydraulic gradient values which are associated with initiation of internal erosion on one hand and full development of piping on the other for unfiltered exit faces. Generally speaking there is a trend towards higher porosity soils beginning to erode at lower hydraulic gradients even lower than 0.3. Yet soils wvith plastic fines erode at higher gradients but gap-graded soils begin to erode at lower gradients than non gap-graded soils with the same fine content. The US Army Corps of Engineers uses a lowver bound value of the critical hydraulic gradient equal to 0.8 and allows a hydraulic gradient of up to 0.5 at the toe of levees provided a number of conditions are met (USAGE). Another way to address the incipient motion of soil particles in internal erosion problems is to use the concept of critical velocity and charts such as Fig. II1 and 12. Howvever these critical velocities were developed from sheet flow test and the critical velocity may be different from those initiating internal erosion.1.2 __.._, iE 1.0 *L "'" P~ *'" *." " 0.8/"":" 9 HYDRAULIC V .. ..**GRADIENT 0.6 ** .~0.2 .:: 1 2 3 4 5 6 COEF. OF UNIFORMIT"Y CuI D 6/DIO Fig. 30 -Range of hydraulic gradient values associated with internal erosion (after Perzlmaier, 2005).Most of the time, a complete breach occurs within 12 hours Of first visual detection of internal erosion and sometimes in less than 6 hours. The majority of failures occur during the first filling or within 5 years after first filling. The process of suffusion tends to develop more slowly than the back erosion and piping process.Page A-35 Appendix A The solution to many of the internal erosion problems is the use of quality filters. A filter is a layer of soil placed between a fine grained soil and coarse grain soil to transition the flow without having the fines of the fine grained soil erode through the voids of the coarse grained soil. The grain size distribution curve of the soil filter layer is designed to provide this transition in a gradual fine to coarse fashion.Page A-36 Appendix B Original Xu and Zhang Regression Equations and HRR Hydrograph a..
* I,;I,,.,cIII U ,U -" .... " ua ..... -i i,~a~iw i,~ n &#xa3;.W~d APPENDIX B APPENDIX B. ORIGINAL XU AND ZHANG REGRESSION EQUATIONS B.1 Overview The original Xu and Zhang (2009) regression methodology and its previous implementation to the Jocassee Dam are described in this Appendix.
This provides background for Section 6 where we address the questions raised by the* FERC and the NRC. It also provides background for Section 7 where we describe the implementation of a revised version of the Xu and Zhang equations in a sensitivity analysis, which provides support for the breach hydrograph submitted in the Hydrologic Reevaluation Report (HRR) to the NRC by Duke on March 12, 2013 (Duke 2013).Section B.2 summarizes the breach parameters and control variables in the Xu and Zhang (2009) regression equations.
Section B,3 discusses the case histories that were used to develop these equations and Section B.4 summarizes the regression equations, including their confidence limits. The implementation of the original Xu and Zhang (2009) methodology for the Jocassee Dam is described in Section 8.5 and details of the use of the failure time estimate in the HEC-RAS model are discussed in S ection B.6, B.2 Breach Parameters and Control Variables The Xu and Zhang (2009) multiple regression equations were developed to pred'ict the following five breach parameters (dependent variables), which are divided into two groups, breach geometry and breach hydrograph:
* Breach Geometry o Breach depth (Hb)o Breach top width (Bt)o Average breach width (Boe)* Hydrograph o Peak outflow rate (Qp,)o Breach development time or failure time (T 1)The predicted breach side slope, z, which is an input to HEC-RAS breach model, can be calculated from the breach depth (Hb), breach top width (Bt) and average breach width (Bave).The predicted breach bottom elevation, which is also an input to the HEC-RAS breach model, can be calculated by subtracting the breach depth from. the d/am crest elevation.
Unlike most previous breach parameters regression relationships, Xu and zhang (2009)included :soil erodibility as a' control (independent) variable.
In fact they found it to be the single most important of all the control Variables that they considered in terms of its explanation of the variance in "observed" breach parameter values across the case histories ,on which their methodology is based.P AG6E B-I
..,
-"rI-nr,,iu;
[u,,,aw puunvu uiacl.iuure per 1u 1PMK x.JWu(a)APPENDIX B The complete list of five control variables that they used to estimate breach parameters is as follows, including norm atization for the first two variables:
* Dam height (X 1 = -dH,.r, dam height Hd and areference height Hr, where H,.= 15mi),* Reservoir shape coefficient
('X 2  1 1/Hw, volume of water above breach invert Vw and depth of water above the breach invert at the time of failure, l-w.),* Dam type (with corewalls, concrete faced and homogeneous/zoned-fill),* Failure mode (overtopping and seepage erosion/piping),* Dam erodibility (high, medium and low).Xu and Zhang (2009) included rock-flll dams in :the homogeneous/zoned-fill dam type. Dam type, failure mode and dam erodibility are included in the regression analysis as virtual discrete variables that represent either the presence or absence of each of these attributes.
As mentioned above, Xu and Zhang (2009) found dam erodibility to be the most important control variable for predicting all five breach parameters.
They describe dam erodibility as a relative measure based on the embankment material compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information.
The three erosion categories (low, medium or 'high) used in the Xu and Zhang (2009) equations refer to the technical lecture paper by Briaud (2008), whereby soils and rocks are classified into various erosion resistance categories based on erosion velocity or shear stress, as shown in Figures 4.1a and b, respectively.
The appropriateness of using the Briaud erosion categories in the Xu and Zhang (2009) methodology was confirmed by Professor Briaud as detailed in Appendix A and summarized in Section 4.2.B.3 Case Histories The Xu and Zhang (2009) regression equations are based on an analysis that includes more recent breaches than are included in earlier relationships, such as Froehlich (1 995a and b). It.also includes data from China that has not been previously used in breach regression equations.
Data from a total of 75 earth and rockflll dam failure cases was used to develop the original multiple regression equations, although for each breach parameter the number of case histories that were used to estimate the best exact and best simplified equations, respectively are as listed below:* Breach depth (Hb): 66 and 71* Breach top width (Bt): 54 and 61* Average breach width (Bay.): 45 and 53* Peak outflow rate (Qp): 34 and 39* Breach development time or failure time (Tt): 28 and 30 PAGE B3-2 I------ 5~~* -- -- -------I-,...... .....APPENDIX B 38 (51%) of the 75 case histories are for US dams, 32 (43%) are from China and 5 (7%) are from other countries.
7% (5) of the 75 case histories are for dams that were classified as dams with core walls, 5% (4) were classified as concrete-faced dams and the remainder were classified as composite-fill dams. 61% (46) of the case history dams failed by overtopping and 39% (29) by seepage-erosion failure modes. 40% (30) of the case history dams were classified as high erodibility, 51% (38) as medium erodibility and 9% (7) as low erodibility.
Figures B~la and b show the depth of water abOve breach invert, Hw, and volume of water at the breach time, Vw, for the 75 case histories onarithmetic-arithmetic and arithmetic-logarithmic axes, respectively.
Across the 75 case histories the depth of water above breach invert, Hw, ranges from 1.7 to 77 m (5.5 -254 feet) compared with a predicted value of 72.5 m (238 feet)for the Jocassee Dam using the original Xu and Zhang (2009) methodology.
The dam heights, Hd, range between 3.2 and 93 m (10 -305 feet) compared with 117.3 m (385 feet) for the Jocassee Dam. The volume of wafer at the breach time varied between 0.025 to 660.0 m 3 x 106 (5.5 -535,000 acre-feet) compared with a predicted value of 1.34 x 108 m 3 (1,088,208 acre-feet) for the Jocassee Dam using the original Xu and Zhang (2009) methodology.
B.4 Regression Equations and Confidence Intervals Xu and Zhang (2009) developed two types Of multiple regression eqUatiOns for estimating the five breach parameters:
* Best exact prediction equations
-based only on failure cases where all five control variables were available , Best simplified prediction equations
-includes some additional failure cases where not all five control variables were 'avail able Best exact prediction regression equation for breach depth is in the following additive (linear)form: Yj= bo + blX 1.+ b 2 X 2 + (b 3 1 X 3 1 + b 3 2 X32 +  3) + (b 4 1 X 4 + b 4 2 X 4 2)'+ (bslX 5 1 + b 5 2 X 5 2 + bs3X 5 3) (1)in which:= the first (i.e. i = 1) breach parameter or dependent variable, i.e.normalized breach depth as defined in Figure B.2 Xii = the control variables as defined in Figure B.2 bjj = the regression coefficients corresponding to the control variables PAGE B-3 cz-vzt.: Uu,.~tf.,..
L:.........L~....
~1~4~rr--
-E'~af -- 10 017? E.W~1.................
0 APPENDIX B Original Xii and Zhang Data U 70 I.150'40.I SOther mIOCahOO O~iin.I Xu and  IU 0 200 400 6OCX 8O0 1000 1200 V.Iqmwe of wowr awe bq,.d hwmt Vw Ii. 106 m31 1400 a) Arithmetic-arfthmetlc scales Original Xii and Zhang Data 80t IU 140 I 9 U.1D;X.* o U* USA m Chin a mJoca.., -o~rigin xu rand Zhang 1000 0.01 0.1 1 10 100 Vuiwn. of wotr do,. beumds Inwt Vw Ia 106 m33 b) Arithme.timogarlthmic scales Figure B.1. Depth of water above breach invert vs. volume of watr at the breach time for the original Xu and Zhang (2009) case h Istborles.
P A E B3f -4
'~t~"~ ~~tf1tr b'Orre!r S nT3J~i1Jta3fl w;u~j: r:.... ,....LL...
~ ,.,~. ~,.APPENDIX B Breaching Parameters Control Variables Breach .depth Yt= Jib/Ha Dam height X =H/r Breach top width Y= Bt/Hb Reservoir shape coefficient x 2 = w ,, Average breach width Y 3 = Bave/Jib Dam type X 3 1  X 3 2  X 3 3 Peak outflow rate y, O/ 13 with corewalls la(eb) 0(1) 0(1)Failure time Ys= T 1 ,/T,. concrete faced 0(1) 1(e) homogeneOus/zoned ,fill 0(1). 0(1) 1(e)Failure mode X 4 2  X 4 2 , overtopping 1(e) 0(1)seepage erosion/piping 0(1) 1(e)Dam erodibility xs 2  X 5 2  xs3 high ,l(e). 0(1) 0(1)medium 0(1) 1(e) 0(1)low 0(1) 0(1) 1(e)Note: B Values for additive regression analy sis b Values for multiplicative regression analysis.Hr=15m; T = 1hour Figure B.2. Summary of the five breach parameters and five control variables in the Xu and Zhang (2009) regression-eq uations For the other four breach parameters, the following multiplicative (non-linear) form of regression equation was Used in which all five .control variables were included for the best exact prediction equations but a subset of these variables were included for the best simplified prediction equations, as described below:. --= z (3)in which: Yj = the second through fifth (i.e. ! = 2, 3, 4 and 5) breach parameters or dependent variables as defined in Figure B.2 Zt = untransformed breach parameter in natural space, To obtain the predicted breach parameter values in natural space a log transformation must be applied to from Equation 2 , as follows;Zi = log (Y 1)= b 0 , + b 1 X 1 + b 2 X 2 + (b 3 1 X 3 1 + .b 3 2 X 3 2 +  3) + (b 4 1 X 4 1 +I-b 4 2 X42) +(b 5 1 X 6 1+ b 5 2 X 5 2+ b 8 3 X 5 3) (4)P AG EB-S


;,[,.a -II,..,IU ,.u,, puI, Up PUt Iv .,rI ~APPENDIX B Under the standard assumption in regression analysis that the variability, in the breach*parameters that is not accounted for in (i.e. explained by) the regression equations (i.e. by the*variation in the values of the control variables) is distributed according to a normal or Gaussian (bell curve),.probability distribution (Haan 1977). Under this assumption, the mean values predicted that are obtained using Equations I and 2 are also the median or 5-0 th percentile values. However, for the multiplicative form of the reg~ression equation in Equation 2, the. effect of the log transformation shown in Equation 4 is that the variability in the breach parameters that is not accounted for in (i~e. explained by) the regression equation is distributed according to a log-normal probability distribution.
Appendix B Original Xu and Zhang Regression Equations and HRR Hydrograph
After 'transformation, the mean value., predicted in transformed log space from Equation 2, which is also the median or 5 0 th percentile value in log Space, is still the median ,in the natural space but it is not the mean value in the. natural space due to the effect of the log transformation.
Another effect of this log transformation is that the confidence intervals .are asymmetric.
By design, all five control variables appear in the best exact prediction equations as shown in'Figure B.2. However, for breach depth, Hb, the best exact prediction equation excludes the reservoir shape coefficient (X 2 = VW, '3!Hw) for two reasons. First, the reservoir shape coefficient was found to have a very small Contribution to explaining the variance in predicting Hb (Xu and Zhang 2009). Second, both t:he volume of water above breach invert, Vw, and the depth' of water above the breach invert at the time of failure, H, (where Hw = normal maximum reservoir level of 1,11i0 feet 'msl. minus Hb) are functions of Hb and so if the reservoir shape coefficient was included as a control variable then H~b would appear on both the left and right sides of regression equation.Best Simplified prediction equations were obtainedl through a stepwise regression procedure in which regression equations with .different combinations of the five contr~ol variables were developed for each breach parameter.
This is a standard method in regression analysis (Haan 1977) with the goal of striking a balance between prediction accuracy and simplicity in the equatiOn (i.e. fewer control variables).
The equation that has the highest adjusted coefficient of determination, zRoaj, is selected as the best simplified equation, where R~dj is defined as follows: n--i)R 2 -k :(5)in which: n = number case histories for which data are used in the regression.analysis.= 'coefficient of determination k = number of control variables used in' the 'regressiOn analy sis The (unadjusted) coefficient of determination, R 2 , is less for the selected best simplified prediction equation than for. the best exact prediction equation for the same. breach parameter because fewer independent or control variables are included.
Hence the best exact prediction P A 6E -6
-fl.. p.~ f..9 .* l.. sr n.i m SE* ScaRn .5. _ .-.,r -.* l*auamvu * * --
Uw vleu lmV llma 11 IIV Vl IIII. " ,APPENDIX B equations have greater prediction accuracy because they explain a greater fraction of the variability between ,values of each breach parameter across the case histories.
However, the standard error-of the regression for the best simplified prediction equation, and hence the width of the confidence intervals for breach parameter estimates, is less than for thle best exact prediction equation for the same breach parameter.
This is because there are more degrees of freedom when fewer regression coefficients are estimated because, there are fewer control variabres.
Another factor that may further decrease the standard error of regression, s2, is that additional case histories may be available tO use in the regression when. there are fewer control variables because for some case histories estimates were. not available for all five control variables as required ifor the best exact prediction equations.
The-XU and Zhang (2009) best exact and best-simplified prediction equations for all five breach parameters are presented in terms of the estimated values of their regression coefficients in Tables B.1 and B.2, respectively.
These tables also include the standard error of the regression, which-can be Used to calculate confidence intervals for breach parameter estimates in addition to median predictions that are obtained directly from the regression equations.
Xu and Zhang (2009) conducted a comparison with two breach prediction methods (Bureau of Reclamation 1982 and 1988 and Froehlich 1995a and b) and demonstrated that their method provides a lower bias and standard error on predictions than these other methods. They admit that since this comparison used data on which their, model is based it may have had an advantage over other models included in the comparison, but they nevertheless claim that the comparison iS fair.Xu and Zhang (2009) included two applications of their equations .to actual dam breaches for..Banqiao and Teton dams. Banqiao Dam was an overtopping failure and Teton Dam was a piping failure..
The predictions are comnpared with the Observed values of the breach parameters for both the best exact and the best simplified models in Tables 7 and 8 of their paper,*respectively.
They also include lower and upper bound estimates based on a 95% confidence interval.
The theoretical meaning of this confidence interval is that there is a .95% chance that the :true values of the breach parameters are *contained*
in the range ,between the lower and upper bound values. The lower and upper bound values for an additive (linear) regression model for breach depth are equally spaced on either side, of the median, estimate and this can be seen, within the limits of round off in the estimates, as shown in Tables 7 and 8 of the Xu and Zhang (2009) paper. However, .the spacing between the median estimates and .the lower and upper bounds for the remaining, four breach parameters is very *asymmetric due to the multiplicative (non-linear) form of the regression models for these parameters as explained above. Specifically there are approximately two to three and a half fold differences between the median and lower bound estimates compared .with between .the upper, bound and median estimates for these breach parameters..
Clearly the widths of the 95% confidence intervals are large for all breach parameters.
We return to the topic of the confidence intervals on the Xu and Zhang (2009) breach parameter estimates in Section B.5 where we discuss how they apply specifically to the Jocassee Dam breach parameter estimates that. are the focus of this report.PAGE 8-7
,....:...., LL L.,, 1Z' ..Z DIL t.SiLL T .... ~f 3.flCd q I APPENDIX B Table B.1. Summary of the five Xu and Zhang (2009) best exact regression equations Breach Parameter Number 'Control bO h 2 b1 b2 3 l b2 bl b21 b3S2vlx(Or Variables b0 b 2 b 1 1 b3r b31 42 b 1 b2 S 1 Y(orlogv) ofCases [1gnnlna (orlog b0) ____._______
Reservoir
____Dam Type _________
rdibi~lty Care lor Inecpt Ht Sh~:Core Wall CFRD Homog overtop .Piping High Medium Low______Coef., ___ Zoned Hb/Hd 66 Xl,2,3,4,S 0.453 0.023 0.000 0.143 0.1,76 0.132 0.218 0.236 0.254 0.168 ,0.031 0.350 0.012 54 lnX1,2.3,4,S 0.060 :0.092 0.308 0.061 -0.089 0.299 -0.239 0.4Ul -0.062. .0.289 0.620 0.169 Iog, (Bove/Hbj 43 lnXl,2,3,4,5
-0.240 0.133 0.662 0.026 -0.226 0.148 -0.389 0.291 -0.391 0.648 0.184 fogtQp/VgVw5/3) 34 InX1.2,3,4,S
-1.744 0.199 -1.274 -0.S03 -0.$91' -0.649 -0..705 -1.039 -0.007 -0.375 -1.362 0.0 0.365 log(TJ/Tr)
,2.8 InXl,2,3,4,.5
-1.190 0.707 1.22g -0.327 -0.674 -0.189 "-0.579 -0.611 -1.205 -0.56.. 0.579 0.793 0.365 Table B.2._Summaryof the five revised Xu and Zhang (2009)_best simplified regression equations B e d P a a e e N u b r C o n tro l $O11 2 y 1 lx (o r recPaaee Nuer Variables bO b b2 b31 h32 b33 b41. b42 b51 bS2 b53 R2 4 gy~x VY(orliogY) of Cases: !~:nnier (or log hO) I $2I Il..............
..... .... .......Reservoir
-.DamTvpe _ _ __ _ _ __ErodibilltyCate
[ry ._Intercept H-gt Shape CoroWalogRDOvertop Piping High Medium Low___________________Coef.
__ore_ Wall __ -*R ,Zoned Hb/Hd 71 Xl,5 03729 -0.025 ,. _ {0.343 0.257J 0.129 0.314 0.011 Ioq(St/Ilb) 61 linX24,4S
-0.004 0.558 ___ __ 0.258 -0162 .0.377 -0.092 -0.188 0.584 0.159 Ioq(Save/Hb) 53 InX2,4S 1.713 0.739 ___ __ -1.207 .4-.747 -0.613 .4.073 -1.268 0.669 0.173 lop(QJp/VpVwSI3) 39 InX2,4,5 2.--020 1.276 -______ ___ -0.788 :-1.232 -0.089 -0.498 -1.433 .0.777 0.304 (otl~i/Tr) 30 -1.593 0).654 1.246 ___ __ ______ -1.375 -0.828 0.310' 0.727, 0.288*P A E .B-8" APPENDIX 8 B.5 Implementation for Jocassee Dam -Xu and Zhang Breach Parameter Estimates
..As described in our February 2013 repOrt (Ehasz and Bowles 2013), we applied the Xu and Zhang (2009) regression equations to the Jocassee Dam to obtain the estimates of the breach parameters for a sunny-day piping failure. We also estimated the confidence intervals for the estimated breach parameters.
These were calculated using the values of the standard errors of regression published by Xu and Zhang (2009) in Tables Bl.1and B.2 and the equations for the confidence intervals for a multiple regression that can be found in many textbooks (e.g. Haan 1977). To verify our spreadsheet for applying the Xu and Zhang (2009) regression equations we first .reproduced, within a small round-off error, the median and confidence interval estimates that are presented in the. Xu and Zhang (2009) paper for Teton and Banqiao dams. We also closely matched estimates made independently by HDR for the Jocassee Dam as shown in our February 2013 report (Ehasz and Bowles Values representing the Jocassee Dam were assigned to the five control (independent)
Variables in the Xu and Zhang (2009) regression equations as follows:* Dam height, Hd = 385 feet.* Reservoir shape coeffiCient, Vw 1 1 3/Hw, in which V.w is the volume of water above breach invert based on the stage-capacity relationship for Lake Jocassee evaluated between the normal maximum reservoir level of 1,110 feet msl. and the elevation of the breach invert [i.e. crest elevation of 1,125 feet msL. minus breach depth Hb and the depth of water above the breach invert at the time of failure=, Hw (iLe. normal maximum reservoir level of 1,110 feet msl. minus breach depth)]. Both VAw and Hw are calculated using the predicted values of breach depth obtained from Xu and Zhang (2009). The Lake Jocassee elevation-area-storage volume was obtained from Jocassee DWG No. J-17.*Dam type selected as ho~mogeneous/zoned-fill, which iS. the dam type that includes rockfill dams in the Xu and Zhang (2009) methodology.
* mode selected as seepage erosion/piping,* Dam erodibility assigned as the low erosion category.The low erosion category was assigned based on the characterization of the Jocassee Dam summarized in Section 3.1 and the descriptions of the erosion categories from Briaud (2008)contained in Figures 4,ia and b. The Jocasee. Dam is desioned and constructed as a modern dam Wit veW deser7)(F) dam wth vry dese -core ~zone. The assignment of the 'low erosion category for Jocassee Dam for application of the Xu arnd Zhang (2009)methodology was subsequently confirmed by Professor Briaud as detailed in Appendix A and summarized in Section 4.3.Table 8.3 shows the input values and the breach parameter estimates from our application of the original Xu and Zhang (2009) methodologY to the Jocassee' Dam. Separate breach parameter estimates are included for the best exact and best simeplified prediction regression P A GEB-9
('~~sugorw
~sour~r; ~ L~rxn~xj rz~r piess;:3.
1~ F&#xb6; ~J~APPENDIX B Table B.3. Breach parameters estimates from Xu and Zhang (2009) application to________________Jocassee Dam.Brah aamtr rsinBest Exact Prediction Best simplifie d predic.tion ,Eoin,95%
Confidence interval Mein95% Confidence Interval BehPaaee ,Category
*Median Lower' Upper Mein Lower .Upper Height of breach, Hb ft, Low 253 18, 337 .761 334 Failure time, Tf hrs. Low' .'1&deg;( F i Breachb top with, St ft. -Low 701 306 5 1,606 55566 299 _ .1,485 Averge reah wdth Sav ft Lb 56 24 1,36 55; 23 ,19 Avrg ra~ width, Ba-A.eft--..w-.566-----------------S--.22-....
1,193 Pekot oo t/e. Low (bx )()F equations.
A more-detailed version of Table B.3; which includes the values calculated for all regression parameters and references the regression equation numbers for the equations that we used from the Xu and Zhang (2009), paper, is contained in Appendix B of our February 2013 report (Ehasz and Bowles 2013).From Table B.3 it can be .seen that using the low erodibility caamn.the best exact prediction
*equations, the median failure time is estimated to be aboul" --" J the median, breach top width about 700 feet, the. median average breach width about 570. feet, hemedian (or mean)breach depth about 250 feet, and the median peak discharge unde (t)(7)(F)
Icfs. Estimates based on the best simplified prediction equations are smaller for all parameters except the breach depth.The 95% confidence interval estimates for 'each breachi parameter are shown in Table B.3 as lower and upper bound estimates that define the confidence interval both below and above the median estimates.
Similar to the examPles for Banqiao and Teton dams, which we discuss in Section B.4, the asymmetry in the confidence intervals can be seen for all breach parameters except breach depth, which is symmetrical because of the additive form ,of the regression equations for breach depth as explained in Section B.4. The symmetry in breach parameter estimates for breach: depth and the asymmetry in-estimates for failure time, breach top Width, and average breach width can be seen in Figures B.3a and b. In these figures the confidence intervals for breach parameter estimates for Jocassee Dam are plotted as a ratio to the median estimate for the Xu and Zhang (2009) best exact and best simplified prediction equations, respectively.
The asymmetry
'in the confidence intervals for failure .time,, breach top .width, :and-average breach width can -be seen by the longer lines above the-median estimate. (plotted at-a ratio = 1.0 shown by the blue dashed line) than b eiow the median estimate.In Table B,3 we have placed boXes around the values ,of the breach parameters that we recommended in our February 2013 report (EhasZ and Bowles 2013) as being most applicable.
to the Jocassee Dam. These were ,used in deVeloping the HRR breach hydrograph submitted to the NRC by Duke (2013). They are median estimates based on the low erosion category.P A 6 E B-IO t.LappU fp.. aflaa.. ...TpLpUIt. l. .ql lLll I.I#IfdlN..pppit.J.*
-WI E~drLI tsfla~FI 5St.~dR* JLdESUJ, Us~.at*mISd~.6SU c8.l = Prt, t E u EI ,ar. .fJEdll APPENDIX B Best Exact Prediction 4.03.5 .-" ..3.O E 25S 2.0___ _____ I_____&#xa3;1.0 ' "'S0.5 ..Height of. Failure time Breach top Average Peak outflow breach width breach .width Breach Parameter a) Best exact predictions Best Simplified Prediction 4.0 ".: 3.5 "..~3.o ........~2.5' ~2.0.. ..-10.5 ..Height of Failure time Breach top Ave rg. Pa ufo*breach width bread wdt*Breach Paramneter rage, h widthoutflow b) Best simplified predictions Figure B,3.* Relative Width of confidence intervals for the original Xu and Zhang (2009)breach parameter estimates for Jocassee Dam expressed as a ratio to the median estimate (ratio = 1.0).-P A 6 E B-il
/ ' APPENDIX B The basis for using low erosion category is explained ,above in this section. The basis for using median estimates is discussed below. *The Xu and Zhang (2009) median and confidence interval breach parameter estimates have the following bases:*Median estimate:
Predicted values from applying a regression .equation whose coefficients have been estimated to minimize the sum of the squares of the differences between the predicted values associated with the regression equation .and the observed values. All predicted values, excePt for breach depth, must be transformed using a log transformation to their natural space as shown in Equation 4. The resulting regression equation represents or "explains" the fraction, R 2 , of the variability in the observed breach parameter values in the data, set of historical dam breaches in terms .of the variation in the observed values of the control variables that were uSed to derive the regression equation in the space in which the regression analysis was performed (i.e.natural space for breach depth and log transformed for all four other breach parameters).
Thus *a regression equation that perfectly fits the observed breach parameter values would have an R 2 value equal to 100%.*Lower and upper bound estimates (Confidence interval):
Based on the variability between observed breach parameter values in the data set of historical dam breaches that is not or "unexplained" by a regression equation.
This unexplained variability is the fraction, (1 -R 2), of the variability in the observed breach parameter values in the data set Of historical dam breaches in the space in which the regression analysis was perfOrmed (i.e. natural sPace for breach depth and log transformed space for all four other breach parameters).
Graphically one can picture the unexplained viariability in breach parameter estimates as being a scatter of points representing the observed breach parameter values about the regression line. A key question is, "Where would one expect Jocas see Dam to fit in the range of the scatter or unexplained variation of breach parameter values for the data setof historical dam breaches used by Xu and Zhang (2009)?" Based on the fact that the Jocassee Dam is a well designed and constructed rockfill dam, which has incorporated modern design criteria and defensive design features (see Section 3.1), the breach: geometry parameter estimates are expected to be in the range between the median and lower bound estimates.
Additional factors that Support these ranges of geometric breach parameter estimates include the following:
*Uni-directional breach formation:
A breach from the. very unlikely failure mode of piping through the foundation in iwould, start high On thJCb(F(r of the Jocassee Dam and can only progress downwards and laterally towards the center of the dam in contrast to developing in two directions as is the case for most historical breaches.
This would be expected to reduce the width of the breach because of the greater erosional resistance of the stable (b)(7)(F) iof the breach. In PA$G E B-12


owuruIy i,,,u,.uwuur "5', ,U;, ,5u ,-,v,u,, 13, v. ,. b.o;J APPENDIX B~addition it would be expect to slow the rate of breach development and reduce the peak breach flow rate.Deposition of eroded rockfiil material and development of tailwater:
a..  *.,*,.,,  *=,,.,,    I,;I,,.,cIII U ,U-" .... ".....ua      - i i,~a~iw      i,~    n &#xa3;.W~d APPENDIX B APPENDIX B. ORIGINAL XU AND ZHANG REGRESSION EQUATIONS B.1    Overview The original Xu and Zhang (2009) regression methodology and its previous implementation to the Jocassee Dam are described in this Appendix. This provides background for Section 6 where we address the questions raised by the*FERC and the NRC. It also provides background for Section 7 where we describe the implementation of a revised version of the Xu and Zhang equations in a sensitivity analysis, which provides support for the breach hydrograph submitted in the Hydrologic Reevaluation Report (HRR) to the NRC by Duke on March 12, 2013 (Duke 2013).
The rockflul material moved by the breaching process would ravel downstream by the flow through the breach and much of this material would be deposited within a short distance downstream of the dam. This would cause a significant taliwater to develop that would reduce flow velocities through the breach thus inhibiting both downward erosion and lateral development-of the breach with the result that a narrower and shallower breach would be formed, taking a longer" time to form, and resulting in a lower peak breach flow rate.The combination of all these considerations provides strong evidence that the use of median values of breach geometry parameter restimates for the Jocassee Dam would be a conservative choice. TherefOre we would expect that realistic breach' geometry parameter estimates for the Jocassee Dam would be in the range between the median and lower bound estimates obtained from the Xu and Zhang (2009) regression methodology.
Section B.2 summarizes the breach parameters and control variables in the Xu and Zhang (2009) regression equations. Section B,3 discusses the case histories that were used to develop these equations and Section B.4 summarizes the regression equations, including their confidence limits. The implementation of the original Xu and Zhang (2009) methodology for the Jocassee Dam is described in Section 8.5 and details of the use of the failure time estimate in the HEC-RAS model are discussed in S ection B.6, B.2    Breach Parameters and Control Variables The Xu and Zhang (2009) multiple regression equations were developed to pred'ict the following five breach parameters (dependent variables), which are divided into two groups, breach geometry and breach hydrograph:
Similar arguments to those made for breach geometry parameter estimates for the Jocassee Dam being in the range between the median and lower bound estimates can be made for failure time,, except that theY would support a failure time 'estimate between the median and the Upper bound estimate.
* Breach Geometry o Breach depth (Hb) o Breach top width (Bt) o Average breach width (Boe)
Therefore, the use of the median estimate for failure time is also considered to provide a conservative esti mate of the failure time as defined by Xu and Zhang *(2009).It follows from the same reasoning as discussed above for the breach geometry parameter estimates and the failure time estimate for the Jocassee Dam, that the peak breach flow estimate would be expected to be in the range between the median and lower bound estimates obtained from the Xu and Zhang (2009) regression methodology.
* Hydrograph o Peak outflow rate (Qp,)
o Breach development time or failure time (T1)
The predicted breach side slope, z, which is an input to HEC-RAS breach model, can be calculated from the breach depth (Hb), breach top width (Bt) and average breach width (Bave).
The predicted breach bottom elevation, which is also an input to the HEC-RAS breach model, can be calculated by subtracting the breach depth from. the d/am crest elevation.
Unlike most previous breach parameters regression relationships, Xu and zhang (2009) included :soil erodibility as a' control (independent) variable. In fact they found it to be the single most important of all the control Variables that they considered in terms of its explanation of the variance in "observed" breach parameter values across the case histories ,on which their methodology is based.
P AG6E B-I
 
o*....    *.  ., ;* .;.Is*;;;r,,*v          - "rI-nr,,iu; [u,,,awpuunvu uiacl.iuureper 1u 1PMK x.JWu(a)
APPENDIX B The complete list of five control variables that they used to estimate breach parameters is as follows, including norm atization for the first two variables:
* Dam height (X1 = -dH,.r, dam height Hd and areferenceheight Hr, where H,.= 15mi),
* Reservoir shape coefficient ('X2 *-Vw11 /Hw, volume of water above breach invert Vw and depth of waterabove the breach invert at the time of failure, l-w.),
* Dam type (with corewalls, concrete faced and homogeneous/zoned-fill),
* Failure mode (overtopping and seepage erosion/piping),
* Dam erodibility (high, medium and low).
Xu and Zhang (2009) included rock-flll dams in :the homogeneous/zoned-fill dam type. Dam type, failure mode and dam erodibility are included in the regression analysis as virtual discrete variables that represent either the presence or absence of each of these attributes.
As mentioned above, Xu and Zhang (2009) found dam erodibility to be the most important control variable for predicting all five breach parameters. They describe dam erodibility as a relative measure based on the embankment material compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information. The three erosion categories (low, medium or 'high) used in the Xu and Zhang (2009) equations refer to the technical lecture paper by Briaud (2008), whereby soils and rocks are classified into various erosion resistance categories based on erosion velocity or shear stress, as shown in Figures 4.1a and b, respectively. The appropriateness of using the Briaud erosion categories in the Xu and Zhang (2009) methodology was confirmed by Professor Briaud as detailed in Appendix A and summarized in Section 4.2.
B.3    Case Histories The Xu and Zhang (2009) regression equations are based on an analysis that includes more recent breaches than are included in earlier relationships, such as Froehlich (1995a and b). It
  .also includes data from China that has not been previously used in breach regression equations. Data from a total of 75 earth and rockflll dam failure cases was used to develop the original multiple regression equations, although for each breach parameter the number of case histories that were used to estimate the best exact and best simplified equations, respectively are as listed below:
* Breach depth (Hb): 66 and 71
* Breach top width (Bt): 54 and 61
* Average breach width (Bay.): 45 and 53
* Peak outflow rate (Qp): 34 and 39
* Breach development time or failure time (Tt): 28 and 30 PAGE B3-2
 
I------        5~~* --  -- - - ----- I-,
                                                            ...... ir* .....
APPENDIX      B 38 (51%) of the 75 case histories are for US dams, 32 (43%) are from China and 5 (7%) are from other countries. 7% (5) of the 75 case histories are for dams that were classified as dams with core walls, 5% (4) were classified as concrete-faced dams and the remainder were classified as composite-fill dams. 61% (46) of the case history dams failed by overtopping and 39% (29) by seepage-erosion failure modes. 40% (30) of the case history dams were classified as high erodibility, 51% (38) as medium erodibility and 9% (7) as low erodibility.
Figures B~la and b show the depth of water abOve breach invert, Hw, and volume of water at the breach time, Vw, for the 75 case histories onarithmetic-arithmetic and arithmetic-logarithmic axes, respectively. Across the 75 case histories the depth of water above breach invert, Hw, ranges from 1.7 to 77 m (5.5 - 254 feet) compared with a predicted value of 72.5 m (238 feet) for the Jocassee Dam using the original Xu and Zhang (2009) methodology. The dam heights, Hd, range between 3.2 and 93 m (10 - 305 feet) compared with 117.3 m (385 feet) for the Jocassee Dam. The volume of wafer at the breach time varied between 0.025 to 660.0 m3 x 106 (5.5 - 535,000 acre-feet) compared with a predicted value of 1.34 x 108 m3 (1,088,208 acre-feet) for the Jocassee Dam using the original Xu and Zhang (2009) methodology.
B.4      Regression Equations and Confidence Intervals Xu and Zhang (2009) developed two types Of multiple regression eqUatiOns for estimating the five breach parameters:
* Best exact prediction equations        - based only on failure cases where all five control variables were available
    ,  Best simplified prediction equations - includes some additional failure cases where not all five control variables were 'avail able Best exact prediction regression equation for breach depth is in the following additive (linear) form:
Yj= bo + blX1. + b2X2 + (b31X31 + b32 X32 + b*Xs 3) + (b41X4 + b42X42)'
                  + (bslX51 + b52X52 + bs3X5 3)                                                  (1) in which:
Y* =        the first (i.e. i = 1) breach parameter or dependent variable, i.e.
normalized breach depth as defined in Figure B.2 Xii    =      the control variables as defined in Figure B.2 bjj =      the regression coefficients corresponding to the control variables PAGE B-3
 
cz-vzt.: Uu,.~tf.,..
.................          0              L:.........L~....    ~1~4~rr--          -        E'~af              --    10 017? E.W~1 APPENDIX B Original Xii and Zhang Data U
70 I.
150 SOther IU mIOCahOO O~iin.I Xu and Z*man
                    '40.
I 0 200        400        6OCX    8O0    1000    1200    1400 V.Iqmwe of wowr awe bq,.d hwmt Vw Ii. 106 m31 a) Arithmetic-arfthmetlc scales Original Xii and Zhang Data 80t IU 9
U
* USA m Chin a 140                                            .1D    U mJoca.., - o~rigin xu rand Zhang I                    ;X.*            o 0.01      0.1            1          10          100        1000 Vuiwn. of wotr do,. beumds Inwt Vw Ia 106 m33 b) Arithme.timogarlthmic scales Figure B.1. Depth of water above breach invert vs. volume of watr at the breach time for the original Xu and Zhang (2009) case h Istborles.
P A E B3f
                                                                                                                                    -4
 
'~t~"~ ~~tf1tr b'Orre!r S nT3J~i1Jta3fl        w;u~j:      r:.... ,....LL... ~          ,.,~.    ~,.
APPENDIX B Breaching Parameters                                    Control Variables Breach .depth                Yt= Jib/Ha        Dam height                                X =H/r Breach top width            Y= Bt/Hb          Reservoir shape coefficient            x2 = w ,,
Average breach width      Y3 = Bave/Jib      Dam type                            X31    X32        X3 3 Peak outflow rate        y,    O/        13      with corewalls                  la(eb) 0(1)        0(1)
Failure time                Ys= T1,/T,.          concrete faced                  0(1)    1(e)      0(*1) homogeneOus/zoned ,fill          0(1). 0(1)      1(e)
Failure mode                        X42    X42 ,
overtopping                      1(e)    0(1) seepage erosion/piping          0(1)    1(e)
Dam erodibility                      xs2    X52        xs3 high                            ,l(e). 0(1)      0(1) medium                          0(1)    1(e)      0(1) low                              0(1)    0(1)      1(e)
Note:  B Values for additive regression analy sis bValues for multiplicative regression analysis
                            .Hr=15m;T      =1hour Figure B.2. Summary of the five breach parameters and five control variables in the Xu and Zhang (2009) regression-eq uations For the other four breach parameters, the following multiplicative (non-linear) form of regression equation was Used in which all five .control variables were included for the best exact prediction equations but a subset of these variables were included for the best simplified prediction equations, as described below:.                                              *
                    -- = z                                                                            (3) in which:
Yj =      the second through fifth (i.e. ! = 2, 3, 4 and 5) breach parameters or dependent variables as defined in Figure B.2 Zt =      untransformed breach parameter in natural space, To obtain the predicted breach parameter values in natural space a log transformation must be applied to from Equation 2 , as follows; Zi =        log (Y1)
                          =      b0, + b1X1 + b2X2 + (b31X31    +  .b32X32 + b*,X3 ) + (b41X41 +I-b    42X42) +
(b51X61 + b52X52 + b83X53)                                            (4)
P AG EB-S
 
                      *.,,.;d,'*  ;,[,.a          -  II,..,IU ,.u,, puI,  Up .i;*U.urW    PUt  Iv.,rI  &#xa3;.*u(g/
                                                                        ~APPENDIX                            B Under the standard assumption in regression analysis that the variability, in the breach
*parameters that is not accounted for in (i.e. explained by) the regression equations (i.e. by the
*variation in the values of the control variables) is distributed according to a normal or Gaussian (bell curve),.probability distribution (Haan 1977). Under this assumption, the mean values predicted that are obtained using Equations I and 2 are also the median or 5 0- th percentile values. However, for the multiplicative form of the reg~ression equation in Equation 2, the. effect of the log transformation shown in Equation 4 is that the variability in the breach parameters that is not accounted for in (i~e. explained by) the regression equation is distributed according to a log-normal probability distribution.            After 'transformation, the mean value., predicted in transformed log space from Equation 2, which is also the median or            5 0 th percentile value in log Space, is still the median ,in the natural space but it is not the mean value in the. natural space due to the effect of the log transformation. Another effect of this log transformation is that the confidence intervals .are asymmetric.
By design, all five control variables appear in the best exact prediction equations as shown in' Figure B.2. However, for breach depth, Hb, the best exact prediction equation excludes the reservoir shape coefficient (X2 = VW, '3!Hw) for two reasons. First, the reservoir shape coefficient was found to have a very small Contribution to explaining the variance in predicting Hb (Xu and Zhang 2009). Second, both t:he volume of water above breach invert, Vw, and the depth' of water above the breach invert at the time of failure, H, (where Hw = normal maximum reservoir level of 1,11i0 feet 'msl. minus Hb) are functions of Hb and so if the reservoir shape coefficient was included as a control variable then H~b would appear on both the left and right sides of regression equation.
Best Simplified prediction equations were obtainedl through a stepwise regression procedure in which regression equations with .different combinations of the five contr~ol variables were developed for each breach parameter. This is a standard method in regression analysis (Haan 1977) with the goal of striking a balance between prediction accuracy and simplicity in the equatiOn (i.e. fewer control variables). The equation that has the highest adjusted coefficient of determination, zRoaj,  is selected as the best simplified equation, where R~dj is defined as follows:
n--i)R2 - k                                                              :(5) in which:
n        =          number case histories for which data are used in the regression
                                      .analysis
                      .    =        'coefficient of determination k    =          number of control variables used in'the 'regressiOn analy sis The (unadjusted) coefficient of determination, R2, is less for the selected best simplified prediction equation than for. the best exact prediction equation for the same. breach parameter because fewer independent or control variables are included. Hence the best exact prediction P A 6E  -6
 
                  - fl.. p.~ f..9  .5.    .      *                    .-. l.. ,r            _sr    n.i l*            m-.    *SE*          ScaRn auamvu wnl*muv.  * * -- W#l*mallVl* Uwvleu      iJ* lmV *m*    n*    llma *. i*    11  IIV Vl  IIII. Ab*ll*'Vl*lbB*
                          "                                                                                                      ,APPENDIX B equations have greater prediction accuracy because they explain a greater fraction of the variability between ,values of each breach parameter across the case histories. However, the standard error-of the regression for the best simplified prediction equation, and hence the width of the confidence intervals for breach parameter estimates, is less than for thle best exact prediction equation for the same breach parameter. This is because there are more degrees of freedom when fewer regression coefficients are estimated because, there are fewer control variabres. Another factor that may further decrease the standard error of regression, s2, is that additional case histories may be available tO use in the regression when. there are fewer control variables because for some case histories estimates were. not available for all five control variables as required ifor the best exact prediction equations.
The-XU and Zhang (2009) best exact and best-simplified prediction equations for all five breach parameters are presented in terms of the estimated values of their regression coefficients .(b*'s) in Tables B.1 and B.2, respectively. These tables also include the standard error of the regression, which-can be Used to calculate confidence intervals for breach parameter estimates in addition to median predictions that are obtained directly from the regression equations.
Xu and Zhang (2009) conducted a comparison with two breach prediction methods (Bureau of Reclamation 1982 and 1988 and Froehlich 1995a and b) and demonstrated that their method provides a lower bias and standard error on predictions than these other methods. They admit that since this comparison used data on which their, model is based it may have had an advantage over other models included in the comparison, but they nevertheless claim that the comparison iS fair.
Xu and Zhang (2009) included two applications of their equations .to actual dam breaches for..
Banqiao and Teton dams. Banqiao Dam was an overtopping failure and Teton Dam was a piping failure.. The predictions are comnpared with the Observed values of the breach parameters for both the best exact and the best simplified models in Tables 7 and 8 of their paper,
*respectively. They also include lower and upper bound estimates based on a 95% confidence interval. The theoretical meaning of this confidence interval is that there is a .95% chance that the :true values of the breach parameters are *contained* in the range ,between the lower and upper bound values. The lower and upper bound values for an additive (linear) regression model for breach depth are equally spaced on either side, of the median, estimate and this can be seen, within the limits of round off in the estimates, as shown in Tables 7 and 8 of the Xu and Zhang (2009) paper. However, .the spacing between the median estimates and .the lower and upper bounds for the remaining, four breach parameters is very *asymmetric due to the multiplicative (non-linear) form of the regression models for these parameters as explained above. Specifically there are approximately two to three and a half fold differences between the median and lower bound estimates compared .with between .the upper, bound and median estimates for these breach parameters.. Clearly the widths of the 95% confidence intervals are large for all breach parameters. We return to the topic of the confidence intervals on the Xu and Zhang (2009) breach parameter estimates in Section B.5 where we discuss how they apply specifically to the Jocassee Dam breach parameter estimates that. are the focus of this report.
PAGE 8-7
 
q
                                                                ,....:....,L.,,                        LL 1Z'        Z    DIL..        t.SiLL            T.... I
                                                                                                                                                                                ~f        3.flCd APPENDIX B Table B.1. Summary of the five Xu and Zhang (2009) best exact regression equations Breach Parameter Y(orlogv)
Number          'Control Variables ofCases [1gnnlna (orlog b0) bO b0              h b        2 2        b1 b    1 b2 b3r    1 b31  3              l          b2 42
____________I____S2*vl*X) bl b  1        b21 b2            b3S2vlx(Or S      1 Reservoir ____Dam            Type  _________                                        rdibi~lty Care lor InecptHt        Sh~:Core Wall            CFRD      Homog      overtop        .Piping        High      Medium            Low
______Coef.,                                ___                      Zoned Hb/Hd                  66        Xl,2,3,4,S        0.453            0.023    0.000      0.143        0.1,76      0.132      0.218          0.236        0.254          0.168      ,0.031      0.350        0.012
{og(Bt/H'b)*              54      lnX1,2.3,4,S        0.060          :0.092    0.308      0.061        0*088      -0.089        0.299        -0.239        0.4Ul        -0.062.        .0.289    0.620        0.169 Iog,(Bove/Hbj              43      lnXl,2,3,4,5        -0.240            0.133    0.662    -0.041*      0.026      -0.226        0.148        -0.389        0.291        -0*140        -0.391    0.648        0.184 fogtQp/VgVw5/3)                34      InX1.2,3,4,S        -1.744            0.199  -1.274      -0.S03      -0.$91'      -0.649      -0..705        -1.039        -0.007        -0.375        -1.362    0.0          0.365 log(TJ/Tr)              ,2.8    InXl,2,3,4,.5      -1.190            0.707    1.22g    -0.327        -0.674      -0.189 "-0.579              -0.611        -1.205      -0.56..        0.579    0.793        0.365 Table B.2._Summaryof the five revised Xu and Zhang (2009)_best simplified regression equations Ba ea de P recPaaee e      Nu b r Nuer Co n trol Variables            bO              b        b2          b31        h32          b33          b41.          b42          b51          bS2            b53 4
R2 a*
                                                                                                                                                                                                                        $O11 2 ylx1 (or gy~x VY(orliogY)          of Cases: !~:nnier            (or loghO)                                        I                                                                  Il                                        $2I
{0.343
                          .....    ....      .......                              Reservoir    -      . DamTvpe    _      _  __  _    _  __ErodibilltyCate                              [ry                . _
Intercept            H-gt  Shape  CoroWalogRDOvertop                                      Piping        High      Medium            Low
___________________Coef.                                                  __ore_ Wall    -R  __    ,Zoned Hb/Hd                  71            Xl,5          03729            -0.025                    _                    ,.                                                    0.257J        0.129    0.314        0.011 Ioq(St/Ilb)                61        linX24,4S        -0.004                    0.558    ___                            __        0.258        -0162    .0.377            -0.092        -0.188    0.584        0.159 Ioq(Save/Hb)                53        InX2,4S          1.713                    0.739    ___              __                    -1.207          .4-.747      -0.613        .4.073        -1.268    0.669        0.173 lop(QJp/VpVwSI3)              39          InX2,4,5        2.--020                  1.276                              ___          -0.788 :-1.232
                                                                                                                                      -______                      -0.089        -0.498        -1.433    .0.777        0.304 (otl~i/Tr)                30        In12*            -1.593          0).654  1.246    ___              __        ______                                    -1.375        -0.828          0.310'    0.727,        0.288*
PA    E .B-8"
 
APPENDIX 8 B.5      Implementation for Jocassee Dam          - Xu and Zhang Breach Parameter Estimates ..
As described in our February 2013 repOrt (Ehasz and Bowles 2013), we applied the Xu and Zhang (2009) regression equations to the Jocassee Dam to obtain the estimates of the breach parameters for a sunny-day piping failure. We also estimated the confidence intervals for the estimated breach parameters. These were calculated using the values of the standard errors of regression published by Xu and Zhang (2009) in Tables Bl.1and B.2 and the equations for the confidence intervals for a multiple regression that can be found in many textbooks (e.g. Haan 1977). To verify our spreadsheet for applying the Xu and Zhang (2009) regression equations we first .reproduced, within a small round-off error, the median and confidence interval estimates that are presented in the. Xu and Zhang (2009) paper for Teton and Banqiao dams. We also closely matched estimates made independently by HDR for the Jocassee Dam as shown in our February 2013 report (Ehasz and Bowles 2013)*
Values representing the Jocassee Dam were assigned to the five control (independent)
Variables in the Xu and Zhang (2009) regression equations as follows:
* Dam height, Hd = 385 feet.
* Reservoir shape coeffiCient, Vw113/Hw, in which V.w is the volume of water above breach invert based on the stage-capacity relationship for Lake Jocassee evaluated between the normal maximum reservoir level of 1,110 feet msl. and the elevation of the breach invert [i.e. crest elevation of 1,125 feet msL. minus breach depth Hb and the depth of water above the breach invert at the time of failure=, Hw (iLe. normal maximum reservoir level of 1,110 feet msl. minus breach depth)]. Both VAw and Hw are calculated using the predicted values of breach depth obtained from Xu and Zhang (2009). The Lake Jocassee elevation-area-storage volume was obtained from Jocassee DWG No. J-17.
      *Dam type selected as ho~mogeneous/zoned-fill, which iS. the dam type that includes rockfill dams in the Xu and Zhang (2009) methodology.
    * *Failure mode selected as seepage erosion/piping,
* Dam erodibility assigned as the low erosion category.
The low erosion category was assigned based on the characterization of the Jocassee Dam summarized in Section 3.1 and the descriptions of the erosion categories from Briaud (2008) contained in Figures 4,ia and b. The Jocasee. Dam is desioned and constructed as a modern dam veW deser7)(F)
Wit dam wth vry dese
                        -core                                          ~zone. The assignment of the 'low erosion category for Jocassee Dam for application of the Xu arnd Zhang (2009) methodology was subsequently confirmed by Professor Briaud as detailed in Appendix A and summarized in Section 4.3.
Table 8.3 shows the input values and the breach parameter estimates from our application of the original Xu and Zhang (2009) methodologY to the Jocassee' Dam. Separate breach parameter estimates are included for the best exact and best simeplified prediction regression P A GEB-9
 
(
                    '~~sugorw        ~sour~r;~                        L~rxn~xj rz~r piess;:3.                          1~      F&#xb6;  ~J~
APPENDIX B Table B.3. Breach parameters estimates from Xu and Zhang (2009) application to
________________Jocassee                                          Dam.
Brah aamtr            rsinBest                      Exact Prediction            Best simplifie d predic.tion
                                                    ,Eoin,95%                    Confidence interval  Mein95%Confidence Interval BehPaaee                  ,Category        *Median            Lower'        Upper    Mein        Lower          .Upper Height of breach, Hb ft,                Low                          253          18,          337    255.*          .761          334 Failure time, Tf hrs.                  Low'      .'1&deg;(      F                      i Breachb top with, St ft.        -      Low                        701            5 306        1,606      55566          299      _  .1,485 Averge Savreahft wdth Lb                          56            24        1,36      55;            23            ,19 Avrg width,ra~
Ba-A.eft--..w-.566-----------------S--.22-....                                                            1,193 Pekot oo t/e.                          Low            (bx )()F equations. A more-detailed version of Table B.3; which includes the values calculated for all regression parameters and references the regression equation numbers for the equations that we used from the Xu and Zhang (2009), paper, is contained in Appendix B of our February 2013 report (Ehasz and Bowles 2013).
From Table B.3 it can be .seen that using the low erodibility caamn.the best exact prediction
*equations, the median failure time is estimated to be aboul" - - " J the median, breach top width about 700 feet, the. median average breach width about 570. feet, hemedian (or mean) breach depth about 250 feet, and the median peak discharge unde (t)(7)(F)                                          Icfs. Estimates based on the best simplified prediction equations are smaller for all parameters except the breach depth.
The 95% confidence interval estimates for 'each breachi parameter are shown in Table B.3 as lower and upper bound estimates that define the confidence interval both below and above the median estimates. Similar to the examPles for Banqiao and Teton dams, which we discuss in Section B.4, the asymmetry in the confidence intervals can be seen for all breach parameters except breach depth, which is symmetrical because of the additive form ,of the regression equations for breach depth as explained in Section B.4. The symmetry in breach parameter estimates for breach: depth and the asymmetry in-estimates for failure time, breach top Width, and average breach width can be seen in Figures B.3a and b. In these figures the confidence intervals for breach parameter estimates for Jocassee Dam are plotted as a ratio to the median estimate for the Xu and Zhang (2009) best exact and best simplified prediction equations, respectively. The asymmetry 'in the confidence intervals for failure .time,, breach top .width, :and
-average breach width can -be seen by the longer lines above the-median estimate. (plotted at-a ratio = 1.0 shown by the blue dashed line) than b eiow the median estimate.
In Table B,3 we have placed boXes around the values ,of the breach parameters that we recommended in our February 2013 report (EhasZ and Bowles 2013) as being most applicable.
to the Jocassee Dam. These were ,used in deVeloping the HRR breach hydrograph submitted to the NRC by Duke (2013). They are median estimates based on the low erosion category.
P A 6 E B-IO
 
t.LappU  fp.. aflaa..
TpLpUIt.      l.  ...      lLll
                                            .ql      I.I#IfdlN..pppit.J.* -  WI E~drLI tsfla~FI 5St.~dR*  JLdESUJ,  l./l'* Us~.at*mISd~.6SU c8.l =  Prt, E    t u  mI*,ar.
EI      .fJEdll APPENDIX B Best Exact Prediction 4.0
                        .:*    3.5                                          . -"                          .          .
* 3.O E 25S 2.0___                                                        _____                  I_____
                            &#xa3;1.0                  '                      "'
S0.5                                              ..
Height of.          Failure time          Breach top                  Average                Peak outflow breach                                        width              breach .width Breach Parameter a) Best exact predictions Best Simplified Prediction 4.0                                                                                          "
                        .:    3.5                                                                "..
                        ~3.o                      . ......
                        .~2.5
                        '      ~2.0..                                          . .-
10.5 ..
Height of            Failure time          Breach top                  Ave rg.                Pa ufo hrage, width      Pea* outflow
                                              *breach                                        width              bread wdt
                                                                                *Breach Paramneter b) Best simplified predictions Figure B,3.* Relative Width of confidence intervals for the original Xu and Zhang (2009) breach parameter estimates for Jocassee Dam expressed as a ratio to the median estimate (ratio = 1.0).
                                                                                                                                                              -PA6 E B-il
 
                        /                                                            '    APPENDIX B The basis for using low erosion category is explained ,above in this section. The basis for using median estimates is discussed below.
* The Xu and Zhang (2009) median and confidence interval breach parameter estimates have the following bases:
      *Median estimate: Predicted values from applying a regression .equation whose coefficients have been estimated to minimize the sum of the squares of the differences between the predicted values associated with the regression equation .and the observed values. All predicted values, excePt for breach depth, must be transformed using a log transformation to their natural space as shown in Equation 4. The resulting regression equation represents or "explains" the fraction, R2, of the variability in the observed breach parameter values in the data, set of historical dam breaches in terms .of the variation in the observed values of the control variables that were uSed to derive the regression equation in the space in which the regression analysis was performed (i.e.
natural space for breach depth and log transformed space* for all four other breach parameters). Thus *a regression equation that perfectly fits the observed breach parameter values would have an R2 value equal to 100%.
      *Lower and upper bound estimates (Confidence interval): Based on the variability between observed breach parameter values in the data set of historical dam breaches that is not represented* or "unexplained" by a regression equation. This unexplained variability is the fraction, (1 - R2), of the variability in the observed breach parameter values in the data set Of historical dam breaches in the space in which the regression analysis was perfOrmed (i.e. natural sPace for breach depth and log transformed space for all four other breach parameters).
Graphically one can picture the unexplained viariability in breach parameter estimates as being a scatter of points representing the observed breach parameter values about the regression line. A key question is, "Where would one expect Jocas see Dam to fit in the range of the scatter or unexplained variation of breach parameter values for the data setof historical dam breaches used by Xu and Zhang (2009)?" Based on the fact that the Jocassee Dam is a well designed and constructed rockfill dam, which has incorporated modern design criteria and defensive design features (see Section 3.1), the breach: geometry parameter estimates are expected to be in the range between the median and lower bound estimates. Additional factors that Support these ranges of geometric breach parameter estimates include the following:
      *Uni-directional    breach formation: A breach from the. very unlikely failure mode of piping through the foundation in the4~)CF(*              iwould, start high On thJCb(F(r    of the Jocassee Dam and can only progress downwards and laterally towards the center of the dam in contrast to developing in two directions as is the case for most historical breaches. This would be expected to reduce the width of the breach because of the greater erosional resistance of the stable (b)(7)(F)                        iof the breach. In PA$G E B-12
 
~urnzamn* owuruIy oenw*.v,      i,,,u,.uwuur .* "5',   ,U;,,5u,-,v,u,,
v-';-*;'";*.  *,'. 13, v. ,. b.o;J APPENDIX B
          ~addition it would be expect to slow the rate of breach development and reduce the peak breach flow rate.
Deposition of eroded rockfiil material and development of tailwater: The rockflul material moved by the breaching process would ravel downstream by the flow through the breach and much of this material would be deposited within a short distance downstream of the dam. This would cause a significant taliwater to develop that would reduce flow velocities through the breach thus inhibiting both downward erosion and lateral development-of the breach with the result that a narrower and shallower breach would be formed, taking a longer"time to form, and resulting in a lower peak breach flow rate.
The combination of all these considerations provides strong evidence that the use of median values of breach geometry parameter restimates for the Jocassee Dam would be a conservative choice. TherefOre we would expect that realistic breach' geometry parameter estimates for the Jocassee Dam would be in the range between the median and lower bound estimates obtained from the Xu and Zhang (2009) regression methodology.
Similar arguments to those made for breach geometry parameter estimates for the Jocassee Dam being in the range between the median and lower bound estimates can be made for failure time,, except that theY would support a failure time 'estimate between the median and the Upper bound estimate. Therefore, the use of the median estimate for failure time is also considered to provide a conservative esti mate of the failure time as defined by Xu and Zhang *(2009).
It follows from the same reasoning as discussed above for the breach geometry parameter estimates and the failure time estimate for the Jocassee Dam, that the peak breach flow estimate would be expected to be in the range between the median and lower bound estimates obtained from the Xu and Zhang (2009) regression methodology.
Before the breach parameter estimates can be used in the. HEC-RAS simulation, model for the Jocassee Dam, the definition of failure time in Xu and Zhang (2009) must be fully understood so that it can be appropriately used in the model. This is addressed in the following subsection.
Before the breach parameter estimates can be used in the. HEC-RAS simulation, model for the Jocassee Dam, the definition of failure time in Xu and Zhang (2009) must be fully understood so that it can be appropriately used in the model. This is addressed in the following subsection.
B.6 Implementation for Jocassee Dam -Use of Xu and Zhang (2009) Failure Time Estimate in HEC-RAS Model It is important that the definition of failure time.l used by Xu and Zhang, (2009) is taken into*account when using failure time estimates from. their methodology in the HEC-RAS. breach mode~l because this definition is different to the definition that is corrmonly used. (e.g. Froehlich I!995b and 2008). This relates directly`
B.6     Implementation for Jocassee Dam           - Use of Xu and Zhang (2009) Failure Time Estimate in HEC-RAS Model It is important that the definition of failure time.l used by Xu and Zhang, (2009) is taken into
to the fifth question raised by the FERC and NRC (see Section 2). In this subsection we explain how the Xu and Zhang (2009) failure time definition differs.from the definition used by others (e~g. Froehlich 1995b and 2008) and how that was taken into account in the HEC-RAS breach model for the Jocassee Dam.P A G E B-13  
*account when using failure time estimates from. their methodology in the HEC-RAS. breach mode~l because this definition is different to the definition that is corrmonly used. (e.g. Froehlich I!995b and 2008). This relates directly` to the fifth question raised by the FERC and NRC (see Section 2). In this subsection we explain how the Xu and Zhang (2009) failure time definition differs.from the definition used by others (e~g. Froehlich 1995b and 2008) and how that was taken into account in the HEC-RAS breach model for the Jocassee Dam.
~rru-ry YW7F&#xb6;IV~ rnr~r~r:on w:rnnca r.-crr p'::ie Ir:3s:30u:8 ,sr 7U L~fl L3UU;~J W f APPENDIX B For the purpose of this discussion, Figure B.4 is adapted from the Xu and Zhang (2009) paper.It illustrates, for a seepage/erosion/piping failure mode, the distinction between the breach initiation and breach development phases of the breaching process. Outflow during the breach initiation phase is small, and in the case of a piping failure it is the flow through a developing pipe or seepage channel. As commonly defined the time for the breach development phase is the time that the embankment would take to washout after the internal erosion process (piping)advances far enough to form a cavern within the downstream shell of the dam leading to a collapse of a portion of the downstream shell that exposes the core and results in a partial and progressive collapse of the core, exposing it to overtopping.
P A G E B-13
The overtopping would then washout the em bankment.80000A: Outflow repidly Increased[- C.. B: Dam crest collapsed E.60000 C: Peak outflow Breach Initiation Breach Dev lo nt. C: Breach fully formed Phase (Xu and Phase (Xu nd Zha g)SZhang) \, A Iharea BIDeveaopontPhase  
 
',-- 20000[I B Developr(F nt ich)s 10 a.m. 11 12 13 p.m. 14 15 16 Time (hour)Figure B.4. Definition of breach phases in Xu and Zhang (2009) compared with Froehlich (1995b and 2008) illustrated for failure of Teton Dam [Adapted from Xu and Zhang (2009)].Figure 8.4 shows the example of the breach outflow hydrograph for the piping failure of the Teton Dam in 1976. Xu and Zhang (2009) were based on breach development time as defined by Wahl 2004 which states "breach development begins when a breach has reached the point at which the volume of the reservoir is compromised and failure becomes imminent.
          ~rru-ry YW7F&#xb6;IV~           rnr~r~r:on w:rnnca r.-crr p'::ie Ir:3s:30u:8 ,sr                 7U L~fl L3UU;~JWf APPENDIX B For the purpose of this discussion, Figure B.4 is adapted from the Xu and Zhang (2009) paper.
During the breach development phase, outflow from the dam increases rapidly. The breach development time ends when the breach reaches its final size." According to the Xu and Zhang (2009)definition, the time of 10:30 a.m. is a critical point where failure becomes imminent and this time separates the breach initiation phase (ending at point A) from the breach development phase (between points A and D). After 10:30 a.m. (point A) the rates of discharge and erosion of embankment materials from the pipe outflow increased more rapidly. After the collapse of the dam crest at about 11:55 a.m. (point B), the breach developed rapidly due to overtopping of the collapsed dam crest and soon a peak discharge at about 12:15 p.m. (point C). According to Xu and Zhang (2009) the failure time associated with the breach development process, Tf, was approximately 4 hours starting at about 10:30 aim. (point A) and ending at about 2;30 p.m.(point D).Many authors, including Fell et al (2003), point out that it has not been possible to identify the starting time for internal erosion associated with piping, and so it has not been P AC B-14 Cct2 " ... .. ........r- L,;;A. uY~,;; *~ p.r ,u ,h~u(oJ APPENDIX B possible to estimate breach initiation phase times for historical dam breaches. indicated in Figure BA4, it is the breach development time, Tf, 'between points A and D that is the predicted"failure time" in the Xu and Zhang (2009) method. However, this definition of failure ,time differs to that used 'by others, such as Froehlich (1995b and 2008). and Wahl (2013), in which breach development time 4.is. defined as the period of higher outflow between points B and E: in Figure B3.4, or about 1-.25 hours 5.Specifically, the more commonly-used definitions of breach development time are as. follows:the 'time from the beginning of rapid growth of a breach to the time when lateral erosion has stopped (Froehlich 1995b)* the needed time from initiation of a breach until it has reached its maximum size (Froehlich 2008)* the time from when the active erosion front reaches upstream face of dam to when the breach has enlarged to its maximum size (Wah1 2013)From Figure 8.4 it is clear that the Xu and Zhang (2009) definition of breach development time is a longer :period of time (points A -D) than the more commonly-used definition (points B -E).The importance is not so much that there are differences between the way that failure time is defined in Xu and Zhang (2009) compared with other methods, but rather that the way that failure time is applied in a breach model (e.g. HEC-RAS),should be consistent with the definition that, underlies its estimation.
It illustrates, for a seepage/erosion/piping failure mode, the distinction between the breach initiation and breach development phases of the breaching process. Outflow during the breach initiation phase is small, and in the case of a piping failure it is the flow through a developing pipe or seepage channel. As commonly defined the time for the breach development phase is the time that the embankment would take to washout after the internal erosion process (piping) advances far enough to form a cavern within the downstream shell of the dam leading to a collapse of a portion of the downstream shell that exposes the core and results in a partial and progressive collapse of the core, exposing it to overtopping. The overtopping would then washout the em bankment.
Achieving this consistency is discussed next for the application to the. Jocassee Dam.To achieve a compatible implementation of the Xu and Zhang (2009) breach parameter estimates in HEC-RAS, the.Xu and Zhang (2009) median breach failure time (between points A and D) and median breach geometry estimates were input to the HEC-RAS model. The Xuand Zhang (2009) median, peak breach flow rate estimate was: then closely matched by iiteratively changing the orifice coefficient to a final value of 0.1, the breach weir coefficient to a final value of 2.0, and the rate of breach progression relationship between points A and D to the final curve shown in Figure' B.5.Figure B,5 contains the breach hydrographs obtained by HDR for a piping failure of Jocassee Dam using the Xu and Zhang (2009)-~breach parameter estimates presented in Section BS.5 Specifically, this figure includes hydrographa for the Jocassee headwater hydrograph represented by the blue line (left rscale the Jocassee tailwater hydrograph represented by the brown line (left scale
80000A:                                                   Outflow repidly Increased E.60000
* 1,000), and the Jocassee breach idischarge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam. The, breach progression relationship, which is a required HEC-RAS input, and which was* developed iteratively as 4 'in this report the terinsbreach development lime and breach formation time are used interchange-ably.
[-                         C..               B: Dam crest collapsed C: Peak outflow Breach Initiation           Breach Dev lo     nt. C: Breach fully formed Phase (Xu and             Phase (Xu nd Zha g)
sIt isnoted that, if the breach :development time i~s estimated using a: triangular, hydrograph based on the peak flow rate and Volume of water released from, the reservoir Using Equation 6 (see Section 6.2.8), then the estimated breach development time is 2.5 hours, which corresponds to the time between points B and D on Figure B.4.P A G 5. B-15 APPENDIX B 1Lb)(7)(F)
SZhang)                                       \,
Figure 6.5. Jocassee Dam breach progression relationship and breach hydrographs from the HRR (Duke 2013)described in the previous paragraph, is shown by the black line (left scale). Points A, B and D are equivalent to points that are defined in Figure B.4.The final values of the orifice and weir coefficients of 0.1 and 2.7, respectively, appear to be reasonable in terms of representing flow through the rockfill material and flow through the breach following collapse of the dam crest of the rockfill dam, respectively.
AIharea      BIDeveaopontPhase                       ',
In addition the form of the resulting breach hydrograph also appears to be reasonable for a piping failure mode and they closely match the Xu and Zhang (2009) median peak breach flow rate estimate.
              -- 20000[I         *hs          B         Developr(F     ntich)s 10 a.m.         11         12             13 p.m.     14         15       16 Time (hour)
Point A represents the beginning of the failure time as defined by Xu and Zhang (2009) and is the beginning of the HEC-RAS modeling of the enlargement of the pipe. The breach progression curve was adjusted to keep the flow rate to a reasonably low magnitude prior to the collapse of the pipe and the onset of overtopping that is simulated at point B on Figure B.5. This point marks the end of the breach initiation phase as defined by Froehlich (1995b and 2008). Point D on Figure B.5 marks the end of the breach development phase as defined by Xu and Zhang (2009). The time between points B and D is longer than that estimated by other breach parameters estimation methodologies, but as is discussed in Section 6.5, the longer time is reasonable given the volume of the reservoir contents that must be released while simulating a peak breach flow rate that is consistent with the median predicted val ue.In our February 2013 report (Ehasz and Bowles 2013) we concluded that the breach hydrograph in Figure 8.5 is a realistic but conservative breach hydrograph, which has good P A GE B-16 APPENDIX B defendablity based on the validity of the Xu and Zhang (2009) method, the conservatie natur of the median breach parameter estimates, a piping failure mode initiating in th{r!&#xb6;j(F J the deposition of rockfill immediately below the dam, .the low erosion category of the rockfihl material, and the various characteristics of a modern dam that were included in the design and construction of Jocassee Dam.P A GE B-17 C:.;;.L;';;.:.  
Figure B.4. Definition of breach phases in Xu and Zhang (2009) compared with Froehlich (1995b and 2008) illustrated for failure of Teton Dam [Adapted from Xu and Zhang (2009)].
.. .. ..........  
Figure 8.4 shows the example of the breach outflow hydrograph for the piping failure of the Teton Dam in 1976. Xu and Zhang (2009) were based on breach development time as defined by Wahl 2004 which states "breach development begins when a breach has reached the point at which the volume of the reservoiris compromised and failure becomes imminent. During the breach development phase, outflow from the dam increases rapidly. The breach development time ends when the breach reaches its final size." According to the Xu and Zhang (2009) definition, the time of 10:30 a.m. is a critical point where failure becomes imminent and this time separates the breach initiation phase (ending at point A) from the breach development phase (between points A and D). After 10:30 a.m. (point A) the rates of discharge and erosion of embankment materials from the pipe outflow increased more rapidly. After the collapse of the dam crest at about 11:55 a.m. (point B), the breach developed rapidly due to overtopping of the collapsed dam crest and soon a peak discharge at about 12:15 p.m. (point C). According to Xu and Zhang (2009) the failure time associated with the breach development process, Tf, was approximately 4 hours starting at about 10:30 aim. (point A) and ending at about 2;30 p.m.
.........  
(point D).Many authors, including Fell et al (2003), point out that it has not been possible to identify the starting time for internal erosion associated with piping, and so it has not been P AC B-14
",C.FR 2 r ..........
 
Appendix C-Bench. Marking!/Comparative Analysis I.onralns enzsn.ve unlormauu.  
Cct2   "     r- ...                   ..     ........                 L,;;A.
-WIvfl.uIU Ilumi puUII,. u'I~ou.IU/J,=
uY~,;;*~     p.r   ,u       *,r,,h~u(oJ APPENDIX B possible to estimate breach initiation phase times for historical dam breaches. *As indicated in Figure BA4, it is the breach development time, Tf, 'between points A and D that is the predicted "failure time" in the Xu and Zhang (2009) method. However, this definition of failure ,time differs to that used 'by others, such as Froehlich (1995b and 2008). and Wahl (2013), in which breach development time 4 . is. defined as the period of higher outflow between points B and E: in Figure B3.4, or about 1-.25 hours5 . Specifically, the more commonly-used definitions of breach development time are as. follows:
puI ,, Appendix C.1 Benchmarking Rockfili Dams and Failures K APPENDIX C.1 BENCHMARKINGICOMPARATI.VE ANALYSIS This Section presents the' characteristics of several large embankment dams and describes the properties and failure conditions and their relevance to-the J ocassee Dam Benchmarking Rockfihl Dams and Failures Some of the large embankment damns that have-failed over the past 50 years are~summarized in the table at the end of this Appendix 0.1. Although none of these dams are directly relevant to the potential breaching of the Jocassee Dam, as given by the characteristics of each dam and as compared to the modern design and character of Jocassee, they are the most closely related examples on record.Oros Dam -Brazil 1960* 116 feet high failed by overtopping during construction
      ** the 'time from the beginning of rapid growth of a breach to the time when significant*
* Cross-section contained very little rockflhl -just outer zones* Contained mostly sandy shell and sandy lean clay core** 12 hours to initiate breach and 6.5 to 12 hours to breach and drain reservoir Hell Hole -California, USA 1964* 220 feet high failed by overtopping during constr uction* Upstream sloping core with rockfill shells* Rockfill was dumped rockrfill, no compaction
lateralerosion has stopped (Froehlich 1995b)
* 29 hours after overtopping initiated 20,000 cfs was passing through .the rockf ill* 3 hours later the rockfill began to ravel and move downstream.
* the needed time from initiation of a breach until it has reached its maximum size (Froehlich 2008)
Teton Dam -USA 1976* 305 feet high failed by piping during first filling* Zoned earthf ill embankment, no rockfill*. Pervious rock foundations with voids and irregular jointing* Poor core trench design and treatment during construction
* the time from when the active erosion front reaches upstream face of dam to when the breach has enlarged to its maximum size (Wah1 2013)
* Piping beneath and through-the core for days or weeks* Internal erosion of the core materials leaving large void within core* .Core collapsed into the large void and released the r eservoir=* Once core Collapsed, failure occurred in 2.5+1- hours* Failure was confined to- right abutment where core coIlapsed P A GE Cl!-1 o;::. I 3.Ii~*V ~ -VJILJI ~ ~ ~ J~1 ~n&#xa3;IUU APPENDIX C.1 Tau m Sauk UR Dam -Missouri, USA 2006* 100 feet high concrete-faced rockfill dam failed by overtopping
From Figure 8.4 it is clear that the Xu and Zhang (2009) definition of breach development time is a longer :period of time (points A - D) than the more commonly-used definition (points B - E).
* Rockfill was dirty, foundations were marginal and slopes were too steep (1.3H:lV)* 10 feet high reinforced concrete parapet wall along crest*- Operated reservoir with high water levels 8 feet up the parapet wall* Poor performance throughout life, large settlements and excessive leakage* Overtopping of a 10 feet high parapet wall initiated slope failure and total failure* Slope failed anld released the reservoir, it w as not an erosional breach* Failure and draining of reservoir Occurred in .less than. 1 hour Tokwe Mukosi -Zimbabwe, 2014*e 300 feet high COncrete-Faced Rockfill Dam (CFRD) under construction
The importance is not so much that there are differences between the way that failure time is defined in Xu and Zhang (2009) compared with other methods, but rather that the way that failure time is applied in a breach model (e.g. HEC-RAS),should be consistent with the definition that, underlies its estimation. Achieving this consistency is discussed next for the application to the. Jocassee Dam.
* Rockflll was compacted and slopes were 1V:1,.3H* Upstream facing was using cast-in-place curb to form upstream slope* Upstream face was-being prepared for concrete facing to be placed last* Extreme flooding when rockfill embankment was 60%.complete(200 feet)* Water level rose to within 5 feet of existing crest* Flood waters passed through rockfill for two weeks without failure,* Local downstream rockfill slopes raveled locally* When flood waters receded, repairs to slopes were made and construction continued Characteristics of Jocassee Dam (Modern Center Core Zoned Rockfl~l Dam).-South Carolina, USA** 385 feet high central core zoned rockfill dam* Protective filter and drain zones surrounding the core. zone* Densely compacted rockflll embankment With large rock outer zones and along the toe* Widened core zone along the foundation contact to reduce gradients* Grout curtain along foundation and special core material placement along the contact* Quality control of materials, and compaction
To achieve a compatible implementation of the Xu and Zhang (2009) breach parameter estimates in HEC-RAS, the.Xu and Zhang (2009) median breach failure time (between points A and D) and median breach geometry estimates were input to the HEC-RAS model. The Xuand Zhang (2009) median, peak breach flow rate estimate was: then closely matched by iiteratively changing the orifice coefficient to a final value of 0.1, the breach weir coefficient to a final value of 2.0, and the rate of breach progression relationship between points A and D to the final curve shown in Figure' B.5.
.- Extensive instrumentation system and monitoring program* 40 years of acceptable performance and continuous monitoring P A GE C.-2 u----;I-U---
Figure B,5 contains the breach hydrographs obtained by HDR for a piping failure of Jocassee Dam using the Xu and Zhang (2009)-~breach parameter estimates presented in Section BS.5 Specifically, this figure includes hydrographa for the Jocassee headwater hydrograph represented by the blue line (left rscale *,1,000), the Jocassee tailwater hydrograph represented by the brown line (left scale
U-- -U -- --APPENDIX C,.1 A summary of some of the large embankment dams that have failed over the past 50 years olumeBreach-Geomeby (feet) Faue'an Failure Dam Crest V m E roToop lrePeak Failure Tailue .Flr Oros Brazi 196 o ne 116 2,034 535,100 ME Overtop 118 656 426 541 340,035- 8.5 8.5 Heart:Hoeg US 1964 RockfIt 220 24,800 LE Piping" 185 .574 219 397 259,882 50.0 44.0 6.0 Teo Ua97 305 3,100 288,600 ME/HE Piping 285 780 210 495 2,299,.387 4.0 f.5 2.5 Taukam US 2005 R.wklieI 100 6,562 4,300 ME ,,100 ,289,000 1.0 1.0 Saukwe ____ ___Nobe ____ _____Tow- Zimbabwe 2014 CFRD 300 1;500 No Breach LE NWA N/A N/A NIA N/A NWA /A NWA Mukos ________ _________
* 1,000), and the Jocassee breach idischarge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam. The, breach progression relationship, which is a required HEC-RAS input, and which was*developed iteratively as 4 'in this report the terinsbreachdevelopment lime and breachformation time are used interchange-ably.
Failure .... ________ ____ ________NOTES: "The Hell Hole failure was riot a piping failure but was an overtopping of the core and flooding of the rockidil flo 11w through and over the rocidill unti failure"The Taum Sauk failre was caused by a dramatic ten foot overtopping of a parapet wall leading to a failure of the downstream slope and release of the rese~avir.
sIt isnoted that, if the breach :development time i~sestimated using a: triangular, hydrograph based on the peak flow rate and Volume of water released from, the reservoir Using Equation 6 (see Section 6.2.8), then the estimated breach development time is 2.5 hours, which corresponds to the time between points B and D on Figure B.4.
P.A G~E C,1-3  
P A G 5. B-15
;;za ZL~3NIJ a:nnieniro mar 7L~ 1--....... Jr r vl--j Appendix C.2 Embankment Design Considerations Affecting Failures 3.-ww..q.i.
 
3....., WJq~~IZ, 3.... ..f. -I .4.. ...
APPENDIX B 1Lb)(7)(F)
-Uge .Agw L....q ,.w..U$. m ~ itt 0lF1 J)APPENDIX C. 2 EMBANKMENT DESIGN The summary of the characteristics of other dams that have failed in recent times, as given in Appendix C.1 clearly outlines the fact that no modern rockfill dam has failed from internal erosion. Oros and Hell Hole dams were both under construction during failure and were failed by overtopping.
Figure 6.5. Jocassee Dam breach progression relationship and breach hydrographs from the HRR (Duke 2013) described in the previous paragraph, is shown by the black line (left scale). Points A, B and D are equivalent to points that are defined in Figure B.4.
Oros Dam Oros Dam was primarily a sand embankment with some rock protection along the outer shells and is therefore not relevant as a rockfill dam and should not be compared to Jocassee Dam since it is not as robust as Jocassee.
The final values of the orifice and weir coefficients of 0.1 and 2.7, respectively, appear to be reasonable in terms of representing flow through the rockfill material and flow through the breach following collapse of the dam crest of the rockfill dam, respectively. In addition the form of the resulting breach hydrograph also appears to be reasonable for a piping failure mode and they closely match the Xu and Zhang (2009) median peak breach flow rate estimate. Point A represents the beginning of the failure time as defined by Xu and Zhang (2009) and is the beginning of the HEC-RAS modeling of the enlargement of the pipe. The breach progression curve was adjusted to keep the flow rate to a reasonably low magnitude prior to the collapse of the pipe and the onset of overtopping that is simulated at point B on Figure B.5. This point marks the end of the breach initiation phase as defined by Froehlich (1995b and 2008). Point D on Figure B.5 marks the end of the breach development phase as defined by Xu and Zhang (2009). The time between points B and D is longer than that estimated by other breach parameters estimation methodologies, but as is discussed in Section 6.5, the longer time is reasonable given the volume of the reservoir contents that must be released while simulating a peak breach flow rate that is consistent with the median predicted val ue.
Oros would be considered a medium to high erodibility embankment due to the fine materials that make up both the core zone as well as the sand materials within the shells. Due to the very wide cross-section erosion and failure took 6.5 to 12 hours.Oros Dam Cros-,,ection uros usm uvertopping 12 hours to Initiate Breach 6.5 to 12 hours to form breach and drain reservoir P A GEC.2-1 APPENDIX C.2 Hell Hole Dam Hell Hole was a rockfill dam, although dumped rockfill, and is the closest example from an erodibility viewpoint to Jocassee Dam. It had an upstream sloping core, and was partially constructed to a level below the adjacent downstream rockfill.
In our February 2013 report (Ehasz and Bowles 2013) we concluded that the breach hydrograph in Figure 8.5 is a realistic but conservative breach hydrograph, which has good P A GE B-16
The rising waters during the extreme flooding overtopped the lower level core, infiltrated the rockfill and eventually washed out the rockfill in a long and extreme process. The rockfill passed 20,000 cfs of flow for an extended time and with further rising upstream waters the rockfill began to ravel and eventually became unstable, slid downstream due to the excessive flows, formed a breach and failed.The breaching mechanism of rockfill dams, according to the experimental tests on the rockfill dam breaching process performed at the Technical University in Lisbon, Portugal (Franca and Almeida 2002) as well as the experience and observations at Hell Hole Dam in California, is different from what* is usually described for earth dam failures.
 
The dam failure can be divided in two distinct phases: before the occurrence of the breach, and after the occurrence of the breach. In fact, until the moment when the breach develops, the downstream side of the dam experiences damage due to percolation and erosion due to overflow.
APPENDIX B defendablity based on the validity of the Xu and Zhang (2009) method, the conservatie natur of the median breach parameter estimates, a piping failure mode initiating in th{r!&#xb6;j(F       J the deposition of rockfill immediately below the dam, .the low erosion category of the rockfihl material, and the various characteristics of a modern dam that were included in the design and construction of Jocassee Dam.
The turbulent percolation flow induces slope movements, starting from the base of the flow, in an upward evolution until it reaches the surface of the rockfill.
P A GE B-17
The deg~rading process, before the beginning of the breach, has a two-dimensional character and can be compared with typical landslide occurrences.
 
After the initiation of the breach the flow is concentrated on the rockflll section, an eroded channel is formed in the breach direction, and the control section of the breach moves upwards. The breach cross-section evolution is due, not only to the continuous erosion induced by the flow, but also to the rock slides that occur from time to time when the equilibrium conditions are reduced. The other important facts observed in the tests and at the Hell Hole Dam failure and related to the overtopping failures of rockfill dams are the following:
C:.;;.L;';;.:. .. .. .......... ......... r ..........
*The flow over the dam induces damage on the downstream slope before initiation of the breach and influences the initial breach configuration  
                                                        ",C.FR2 22C'*
-this damage is mostly two-dimensional sliding along the longitudinal axis of the dam;*When the overflow discharge is enough to induce the initiation of the breach, a major and sudden slide occurs and the initi al breach appears;*The overflow induces an initial breach width; however, the deposition of the. rock blocks immediately downstream of the dam has a stabilizing effect, prolonging, the failure process -this is reflected mainly in a shallower final breach depth.Thus, a rockfill shell embankment provides more resistance to erosion, even during overtopping after the breach is initiated and thus would prolong the timing of the total breach development.
Appendix C
Therefore, the Jocassee Dam, which is truly a rockfill dam, will provide the best resistance to erosion and be considered a low erodibility dam.P A GE C.2-2 V~, 3..t .~l.. w ;,uj rlw. ,,FlqrwB~.juvr vw,.aFurrkrfmb wu pawI.uukuuw w r&#xa3;.1(APPENDX c.2 Hell Hole Dam Plan View 8*C-s1- 4-7 " )a,,.AA -0.1I IA.. vedhlh 460D *b~m .wnd ..0.e notki ...The kr,@ n7e'S6... ... ..... ... ..... ..........
                                -Bench.Marking!/
2 5 Nq Mmi Abmmmb@.WJ-1w beba. d. 065 mi Hell Hole Dam C rosa-Section PAG;E C.2-3 APPENDI C, Failure of Hell Hole Dam Constuto of Hell Hole Dam on the Rubicon River in Plae County, California began in 1984. The dam failed during construction when the partially completed embankment was overtopped by a flood that was twice as big as the maximum flood of record.The water emerging downstream rocklhil December 22, 1964.eroded.from the toe ofth shell at 3 pm on Some rock has been By 7 am on December 23rd, the flow had increased as the reservoir rose behind the dam, and a considerable portion of the downstream slop had been eroded away.At 9:30 am on December 23rd, a gully had been eroded across the crest of the dam, and the reservoir began to spill over the top of the fill. When this happened the velocity of flow and the rate of erosion increased rapidly, and soon a major portion of the embankment was washed away and the reservoir was emptied.At 3:30 pm on December 23rd, there was a gaping hole in the dam, and very little water in the reservoir.
Comparative Analysis
i --4 II P AGE C.2-,4 APPENDIX C. 2 Teton Dam Teton Dam was essentially a homogeneous earth embankment dam constructed with the local wind-blown silts and sands and was therefore highly erodible.
 
The outer slopes were somewhat protected by a mixture of coarse gravels and sands, which are highly erodible materials.
I.onralns *ecuriry enzsn.ve unlormauu. - WIvfl.uIU Ilumi puUII,. u'I~ou.IU/J,=
The dam was founded on very porous rock conditions and contained voids and open jointing within the rock formations.
puI ,, r-,* 1.JS*.),.
Due to the poor design, foundation treatment and construction within the core trench and along the foundation contact, these factors facilitated piping of the core materials into the downstream rock formations.
Appendix C.1 Benchmarking Rockfili Dams and Failures
The movement and removal of core materials continued, over a period of weeks and carried large volumes of core materials away from the core zone. This process was focused especially along the right abutment and caused a large cavity to be formed within the core of the danm (Osum 2013). That section of the core eventually collapsed as more and more material was removed and deposited within the rocks below the surface of the dam. This phenomenon was unnoticed during the core removal process. It was only when the removed materials began to fill the downstream voids that the flows exited along surface at the right abutment and began eroding the embankment itself.The piping flows that carried the materials from the core rapidly increased and large amounts of water and soil materials exited from the face of the embankment.
 
The local staff attempted to intervene by having bulldozers try to fill the developing openings and restrain the development of the openings, but to no avail. With the continued removal of materials the right abutment imploded into the large void that had formed within the core and the crest of the dam dropped into the opening.This exposed the reservoir; a major breached developed, washed out the right abutment of the dam, and drained the reservoir.
K APPENDIX C.1 BENCHMARKINGICOMPARATI.VE ANALYSIS This Section presents the' characteristics of several large embankment dams and describes the properties and failure conditions and their relevance to-the J ocassee Dam Benchmarking Rockfihl Dams and Failures Some of the large embankment damns that have-failed over the past 50 years are~summarized in the table at the end of this Appendix 0.1. Although none of these dams are directly relevant to the potential breaching of the Jocassee Dam, as given by the characteristics of each dam and as compared to the modern design and character of Jocassee, they are the most closely related examples on record.
The unique undermining of the core by piping materials into the downstream rock voids was unnoticed and eventually formed the large cavity that collapsed.
Oros Dam - Brazil 1960
That collapse of the embankment into the void caused a premature collapse of the embankment leading to the breach. T his premature collapse caused the dam to breach faster than if it Were to form the breach by an erosion process. Thus, from a materials standpoint, and considering the foundation failure mechanism, and the rate of failure, the Teton Dam failure is not comparable to the rockfill materials, rate of erosion, and foundation geology at Jocassee Dam.P A 6 C.2-5 A PPENDIX C. 2 010. 01~rl ,~ -a.s. 0'? Sane tl.~;. ,.0~d nd r~~":;~ 54.S.c4.1 tOed. Q.*e.. end~ MOc.Ifoneoo.
* 116 feet high failed by overtopping during construction
1.11 hdn el .0-CeO. 0 on Jo a, C. 04) 04-000 0+/-) Ot~loled ol, ,oeld. Qoete) 0eG  F'ag.2. Cros-.oectionl through center portion of ambunzknwn.t r'ound.~d on nl]uviurn.
* Cross-section contained very little rockflhl - just outer zones
I'-Cres!El 5332 S: ripping...
* Contained mostly sandy shell and sandy lean clay core
OS d ro~tatd3. Typicol crosB-3ection over abutment founded on jointed rhyolito.P AG1E C.2-6 APPENDIX C.2 Taum Sauk Dam Taum Sauk Upper Dam was a rockflll dam with an impervious upstream membrane.
      ** 12 hours to initiate breach and 6.5 to 12 hours to breach and drain reservoir Hell Hole   - California, USA 1964
It was a dumped rocklill dam designed with very steep downstream slopes of 1.3H:1V and had a 10 foot high parapet wall along the crest. The rockfill was a dirty rockfill, which means the strength of the rockfill was not as high as a cleaner material, such as was used at Jocassee.
* 220 feet high failed by overtopping during constr uction
Although just 100 feet high, it settled as much as two feet along various portions of its four mile length. This settlement had caused much distress to the reinforced concrete parapet wall and it had to be repaired several times during its operating life. Also, as a result of the embankment settlement, the upstream membrane suffered extreme cracking and eventually the entire upstream face of the dam was lined with a HDPE lining to reduce the water losses and improve the stability of the embankment and foundations.
* Upstream sloping core with rockfill shells
During the installation of the lining system a new instrumentation system was installed to record the reservoir levels. Unfortunately the system was not anchored properly along the interior slope of the dam and it moved during reservoir operations.
* Rockfill was dumped rockrfill, no compaction
This gave false readings to the operators and allowed the pumps to overfill the reservoir, which resulted in overtopping of the dam. The parapet wall along the crest of the dam was founded on and within the dam crest. The overtopping allowed the water to erode the crest along the downstream foundation of the parapet wall and caused the wall to overturn and fail. The wall failure caused a 10 foot surge of water to rapidly washout the toe of the downstream slope. This immediately caused instability and failed the over-steep slope. Since the downstream slope was marginally stable at 1 .3H:1V it failed very quickly and released the reservoir.
* 29 hours after overtopping initiated 20,000 cfs was passing through .the rockf ill
Thus, the Taum Sauk failure was not a typical overtopping dam breach caused by erosion; but instead it was a slope failure that released the reservoir.
* 3 hours later the rockfill began to ravel and move downstream.
Therefore the dam breached very quickly, which is not a representative failure by erosion of a rockfill dam. Thus, the failure at Taum Sauk Dam should not be compared to the material quality, slope configuration or failure mechanism that is postulated for Jocassee Dam. At Jocassee Dam the embankment materials would have to be eroded and thus reduce the section to expose the core to the reservoir and form the open breach that would eventually fail.1tagM~z~--  
Teton Dam     - Idaho,* USA 1976
-TYA'CAL W*'E JX~7GV 0? ,5~/ND ROCk~ _________Taum Sauk Cross-Section P AG EC.2-7 APPENDIX C.2 Taum Sauk Breach Taum Sauk Breach Taum 3suK Breach P AG E C.2-S oownuecumy ImWnVUton  
* 305 feet high failed by piping during first filling
-wwunow rum puu uicar per 1(1 WM LJIU(o)APPENDIX C.2 Tokwe.Mukosl Dam The To,,we-Mukosi Dam in Zimbabwe represents the most recent example, February 2014, of the low erodibiflty of rockfill dams. The project involves the constuto of an 90 m (300 ft) high Concrete Face Rockfihl Dam (CFRD) on the Tokwe River and forming a large resrvi impounding  
* Zoned earthf ill embankment, no rockfill
      *. Pervious rock foundations with voids and irregular jointing
* Poor core trench design and treatment during construction
* Piping beneath and through-the core for days or weeks
* Internal erosion of the core materials leaving large void within core
      * .Core collapsed into the large void and released the r eservoir
      =* Once core Collapsed, failure occurred in 2.5+1- hours
* Failure was confined to- right abutment where core coIlapsed P A GE Cl!-1
 
o;::.I           3
                    .Ii~*V         ~     - VJILJI         ~     ~     ~     J~1     ~n&#xa3;IUU APPENDIX   C.1 Taum Sauk UR Dam - Missouri, USA 2006
* 100 feet high concrete-faced rockfill dam failed by overtopping
* Rockfill was dirty, foundations were marginal and slopes were too steep (1.3H:lV)
* 10 feet high reinforced concrete parapet wall along crest
    *- Operated reservoir with high water levels 8 feet up the parapet wall
* Poor performance throughout life, large settlements and excessive leakage
* Overtopping of a 10 feet high parapet wall initiated slope failure and total failure
* Slope failed anld released the reservoir, it w as not an erosional breach
* Failure and draining of reservoir Occurred in .less than. 1 hour Tokwe Mukosi - Zimbabwe, 2014
    *e 300 feet high COncrete-Faced Rockfill Dam (CFRD) under construction
* Rockflll was compacted and slopes were 1V:1,.3H
* Upstream facing was using cast-in-place curb to form upstream slope
* Upstream face was-being prepared for concrete facing to be placed last
* Extreme flooding when rockfill embankment was 60%.complete(200 feet)
* Water level rose to within 5 feet of existing crest
* Flood waters passed through rockfill for two weeks without failure,
* Local downstream rockfill slopes raveled locally
* When flood waters receded, repairs to slopes were made and construction continued Characteristicsof JocasseeDam (Modern Center Core Zoned Rockfl~l Dam).-
South Carolina,USA
    ** 385 feet high central core zoned rockfill dam
* Protective filter and drain zones surrounding the core.zone
* Densely compacted rockflll embankment With large rock outer zones and along the toe
* Widened core zone along the roc*k foundation contact to reduce gradients
* Grout curtain along foundation and special core material placement along the contact
* Quality control of materials, and compaction
    .- Extensive instrumentation system and monitoring program
* 40 years of acceptable performance and continuous monitoring P A GE C.-2
 
u----;I-U---         U--   -L'*
                                                                                                                                                                            -U   --   - -
* APPENDIX C,.1 A summary of some of the large embankment dams that have failed over the past 50 years olumeBreach-Geomeby                                         (feet)                                       Faue
  'an                       Failure       Dam                   Crest       V m       E     roToop         lrePeak                                                                     Failure     Tailue   .Flr Oros         Brazi             196   o   ne           116     2,034       535,100     ME           Overtop           118         656             426         541       340,035-         8.5               8.5 Heart
:Hoeg         US                 1964     RockfIt         220                   24,800     LE           Piping"           185         .574             219       397       259,882         50.0 44.0         6.0 TeoUa97                          oi*            305     3,100       288,600     ME/HE         Piping           285         780             210       495       2,299,.387         4.0   f.5         2.5 Taukam US                       2005     R.wklieI         100     6,562           4,300   ME             ,,100                 ,289,000                                                         1.0               1.0 Saukwe       ____           ___Nobe                                         ____                                       _____
Tow-Zimbabwe             2014     CFRD             300     1;500     No Breach     LE                             NWA N/A               N/A           NIA                   N/A         NWA   /A         NWA Mukos         ________                                                       _________                     Failure                                 ________                  ____        ....       ________
NOTES:
11w through and over the rocidill unti failure "The Hell Hole failure was riot a piping failure but was an overtopping of the core and flooding of the rockidil flo "The Taum Sauk failre was caused by a dramatic ten foot overtopping of a parapet wall leading to a failure of the downstream slope and release of the rese~avir.
P.A G~E C,1-3
 
....... Jr                            ;;za ZL~3NIJ a:nnieniro rmar 7L~ 1-- vl--j Appendix C.2 Embankment Design Considerations Affecting Failures
 
3.-ww..q.i. WJq~~IZ, 3....
3.....,        .. f. - I .4..r..rgi*V..
                                          ...      -   Uge.Agw L....q ,.w..U$. m ~ *. itt 0lF1
                                                                                            *rL3O4lbqP    J)
APPENDIX C. 2 EMBANKMENT DESIGN The summary of the characteristics of other dams that have failed in recent times, as given in Appendix C.1 clearly outlines the fact that no modern rockfill dam has failed from internal erosion. Oros and Hell Hole dams were both under construction during failure and were failed by overtopping.
Oros Dam Oros Dam was primarily a sand embankment with some rock protection along the outer shells and is therefore not relevant as a rockfill dam and should not be compared to Jocassee Dam since it is not as robust as Jocassee. Oros would be considered a medium to high erodibility embankment due to the fine materials that make up both the core zone as well as the sand materials within the shells. Due to the very wide cross-section erosion and failure took 6.5 to 12 hours.
Oros Dam Cros-,,ection uros usm uvertopping 12 hours to Initiate Breach 6.5 to 12 hours to form breach and drain reservoir P A GEC.2-1
 
APPENDIX C.2 Hell Hole Dam Hell Hole was a rockfill dam, although dumped rockfill, and is the closest example from an erodibility viewpoint to Jocassee Dam. It had an upstream sloping core, and was partially constructed to a level below the adjacent downstream rockfill. The rising waters during the extreme flooding overtopped the lower level core, infiltrated the rockfill and eventually washed out the rockfill in a long and extreme process. The rockfill passed 20,000 cfs of flow for an extended time and with further rising upstream waters the rockfill began to ravel and eventually became unstable, slid downstream due to the excessive flows, formed a breach and failed.
The breaching mechanism of rockfill dams, according to the experimental tests on the rockfill dam breaching process performed at the Technical University in Lisbon, Portugal (Franca and Almeida 2002) as well as the experience and observations at Hell Hole Dam in California, is different from what* is usually described for earth dam failures. The dam failure can be divided in two distinct phases: before the occurrence of the breach, and after the occurrence of the breach. In fact, until the moment when the breach develops, the downstream side of the dam experiences damage due to percolation and erosion due to overflow. The turbulent percolation flow induces slope movements, starting from the base of the flow, in an upward evolution until it reaches the surface of the rockfill. The deg~rading process, before the beginning of the breach, has a two-dimensional character and can be compared with typical landslide occurrences. After the initiation of the breach the flow is concentrated on the rockflll section, an eroded channel is formed in the breach direction, and the control section of the breach moves upwards. The breach cross-section evolution is due, not only to the continuous erosion induced by the flow, but also to the rock slides that occur from time to time when the equilibrium conditions are reduced. The other important facts observed in the tests and at the Hell Hole Dam failure and related to the overtopping failures of rockfill dams are the following:
      *The flow over the dam induces damage on the downstream slope before initiation of the breach and influences the initial breach configuration         - this damage is mostly two-dimensional sliding along the longitudinal axis of the dam;
      *When the overflow discharge is enough to induce the initiation of the breach, a major and sudden slide occurs and the initi al breach appears;
      *The overflow induces an initial breach width; however, the deposition of the. rock blocks immediately downstream of the dam has a stabilizing effect, prolonging, the failure process - this is reflected mainly in a shallower final breach depth.
Thus, a rockfill shell embankment provides more resistance to erosion, even during overtopping after the breach is initiated and thus would prolong the timing of the total breach development.
Therefore, the Jocassee Dam, which is truly a rockfill dam, will provide the best resistance to erosion and be considered a low erodibility dam.
P A GE C.2-2
 
*lmfmr V~,       3..t .~l.. w ;,uj rlw. ,,FlqrwB~.juvr   vw,.aFurrkrfmb   r&#xa3;.1(pawI.uukuuw wu                                        w APPENDX c.2
                                                            *J Hell Hole Dam Plan View 8*C-s1-           4-7       " )
a,,.
460D   *b~m .wnd ..
0.e notki ..                                                                             AA      - 0.1I IA.. vedhlh
                                                                                                .The   -o*
kr,@ n7e
                                                                                                                                  'S6
                                                                    .25      . .. .......... Mmi Abmmmb@.WJ-
                                      . .. ...   . ....   ... .                         Nq     beba. d. 065 mi 4*S1w Hell Hole Dam Crosa-Section PAG;E C.2-3
 
APPENDI   C, Failure of Hell Hole Dam Constuto of Hell Hole Dam on the Rubicon River in Plae County, California began in 1984. The dam failed during construction when the partially completed embankment was overtopped by a flood that was twice as big as the maximum flood of record.
The water emerging from the toe ofth downstream rocklhil shell at 3 pm on December 22, 1964. Some rock has been eroded.
By 7 am on December 23rd, the flow had increased as the reservoir rose behind the dam, and a considerable portion of the downstream slop had been eroded away.
At 9:30 am on December 23rd, a gully had been eroded across the crest of the dam, and the reservoir began to spill over the top of the fill. When this happened the velocity of flow and the rate of erosion increased rapidly, and soon a major portion of the embankment was washed away and the reservoir was emptied.
i                            -- 4 II                          At 3:30 pm on December 23rd, there was a gaping hole in the dam, and very little water in the reservoir.
P AGE C.2-,4
 
APPENDIX C. 2 Teton Dam Teton Dam was essentially a homogeneous earth embankment dam constructed with the local wind-blown silts and sands and was therefore highly erodible. The outer slopes were somewhat protected by a mixture of coarse gravels and sands, which are highly erodible materials. The dam was founded on very porous rock conditions and contained voids and open jointing within the rock formations. Due to the poor design, foundation treatment and construction within the core trench and along the foundation contact, these factors facilitated piping of the core materials into the downstream rock formations. The movement and removal of core materials continued, over a period of weeks and carried large volumes of core materials away from the core zone. This process was focused especially along the right abutment and caused a large cavity to be formed within the core of the danm (Osum 2013). That section of the core eventually collapsed as more and more material was removed and deposited within the rocks below the surface of the dam. This phenomenon was unnoticed during the core removal process. It was only when the removed materials began to fill the downstream voids that the flows exited along surface at the right abutment and began eroding the embankment itself.
The piping flows that carried the materials from the core rapidly increased and large amounts of water and soil materials exited from the face of the embankment. The local staff attempted to intervene by having bulldozers try to fill the developing openings and restrain the development of the openings, but to no avail. With the continued removal of materials the right abutment imploded into the large void that had formed within the core and the crest of the dam dropped into the opening.
This exposed the reservoir; a major breached developed, washed out the right abutment of the dam, and drained the reservoir. The unique undermining of the core by piping materials into the downstream rock voids was unnoticed and eventually formed the large cavity that collapsed.
That collapse of the embankment into the void caused a premature collapse of the embankment leading to the breach. T his premature collapse caused the dam to breach faster than if it Were to form the breach by an erosion process. Thus, from a materials standpoint, and considering the foundation failure mechanism, and the rate of failure, the Teton Dam failure is not comparable to the rockfill materials, rate of erosion, and foundation geology at Jocassee Dam.
P A6  C.2-5
 
                      *j A PPENDIX C.2 010. 01~rl Jo
                                              ,~ -                               a, a.s. 0'? Sane tl.~;. ,.0~d nd   r~~"
:;~ 54.S.c4.1 tOed. Q.*e.. end
  ~   MOc.Ifoneoo.       1.11                                 hdn el .0-CeO. 0 on       C. 04) 17,*  04-000 0+/-) Ot~loled   *tol, ,oeld. Qoete) 0eG  CU**itS F'ag.2. Cros-.oectionl through center               portion of ambunzknwn.t r'ound.~d on nl]uviurn.                   I'
                                                                  -     Cres!El 5332 S: ripping...
OS d ro~tatd I*ig. 3. Typicol         crosB-3ection over abutment     *ectlon*    founded on jointed   rhyolito.
P AG1E C.2-6
 
APPENDIX C.2 Taum Sauk Dam Taum Sauk Upper Dam was a rockflll dam with an impervious upstream membrane. It was a dumped rocklill dam designed with very steep downstream slopes of 1.3H:1V and had a 10 foot high parapet wall along the crest. The rockfill was a dirty rockfill, which means the strength of the rockfill was not as high as a cleaner material, such as was used at Jocassee. Although just 100 feet high, it settled as much as two feet along various portions of its four mile length. This settlement had caused much distress to the reinforced concrete parapet wall and it had to be repaired several times during its operating life. Also, as a result of the embankment settlement, the upstream membrane suffered extreme cracking and eventually the entire upstream face of the dam was lined with a HDPE lining to reduce the water losses and improve the stability of the embankment and foundations. During the installation of the lining system a new instrumentation system was installed to record the reservoir levels. Unfortunately the system was not anchored properly along the interior slope of the dam and it moved during reservoir operations. This gave false readings to the operators and allowed the pumps to overfill the reservoir, which resulted in overtopping of the dam. The parapet wall along the crest of the dam was founded on and within the dam crest. The overtopping allowed the water to erode the crest along the downstream foundation of the parapet wall and caused the wall to overturn and fail. The wall failure caused a 10 foot surge of water to rapidly washout the toe of the downstream slope. This immediately caused instability and failed the over-steep slope. Since the downstream slope was marginally stable at 1.3H:1V it failed very quickly and released the reservoir. Thus, the Taum Sauk failure was not a typical overtopping dam breach caused by erosion; but instead it was a slope failure that released the reservoir. Therefore the dam breached very quickly, which is not a representative failure by erosion of a rockfill dam. Thus, the failure at Taum Sauk Dam should not be compared to the material quality, slope configuration or failure mechanism that is postulated for Jocassee Dam. At Jocassee Dam the embankment materials would have to be eroded and thus reduce the section to expose the core to the reservoir and form the open breach that would eventually fail.
1tagM~z~--        -
TYA'CAL W*'E JX~7GV 0? ,5~/ND ROCk
                                            ~             _________
Taum Sauk Cross-Section P AG EC.2-7
 
APPENDIX C.2 Taum Sauk Breach Taum Sauk Breach Taum 3suK Breach P AG E C.2-S
 
oownuecumy *uwu        ImWnVUton -   wwunow rum puu uicar per 1(1 WM LJIU(o)
APPENDIX C.2 Tokwe.Mukosl Dam The To,,we-Mukosi Dam in Zimbabwe represents the most recent example, February 2014, of the low erodibiflty of rockfill dams. The project involves the constuto of an 90 m (300 ft) high Concrete Face Rockfihl Dam (CFRD) on the Tokwe River and forming a large resrvi impounding 1.8 billion cubic meters (1.48 million AF): the larest reservoir in the Country of Zimbabwe . The Owner of the project is the Ministry of Water Resources Development and Management Harare - Zimbabwe.            W~hile the rockfill portion of the dam construction was approximately 60% complete (200 feet) an extreme flood occurred in the watershed and the upstream water level rose to within 5 feet of the crest of the rockfill. The construction on the rockflll cotnued throughout the flooding of the upstream reservoir and the partially constructed rockfill portion held back the waters while discharging water through the rockfill to the downstream.
Tokwe-Mukosi Dam is a Concrete Face Rockfill Dam (CFRD) under construc'tion. It consists of compacted hard rockfill shell and had an upstream sloping transition rock surface in preparation for the future reinforced concrete facing, when the flood occurred. The dam was partially constructed when the rising waters duning the extreme flooding came within five feet of the crest, infiltrated the rockfill and eventually washed through the rockfill in a long and extreme process. The rockfill passed extreme flows for an extended time (two weeks). With the iong period of extreme flows, portions of the downstem slope began reveling but the rockfill embankment maintained overall stability.
Thus, the Tokwe-Mukosi Dam, a compacted rockfill shell embankment provided high resistance to erosion, even during extreme flows through the rockfill, similar to the Hell Hole example above. The dam withstood extreme flows for several weeks and only experienced local downstream raveling. Therefore, the Jocassee Dam, which is truly a rockfill dam, will provide the best resistance to erosion and can be considered a low erodibility dam.
P A GE C.2-9


===1.8 billion===
&#xb6;7f'm '~ V~r      ~        't~              '~'iW ,~1t'~           ff'r        j~rr TI? VFf I I ?fff(IEJ APPENDIX C.2 Tokwe.Mukosl Dam Construction of Tokwe-Mukosi Dam on the Tokwe River in Zimbabwe began in 1989. The dam experienced a flood during constuto when the partially completed rockflhl portion of the embankment was subjected to a flood that raised the upsream level to within five feet of the crest.
cubic meters (1.48 million AF): the larest reservoir in the Country of Zimbabwe .The Owner of the project is the Ministry of Water Resources Development and Management Harare -Zimbabwe.
The water emerging, from the toe of the downstream rockflhl shell on February 2, 2014.
W~hile the rockfill portion of the dam construction was approximately 60% complete (200 feet) an extreme flood occurred in the watershed and the upstream water level rose to within 5 feet of the crest of the rockfill.
Some rock has been eroded.
The construction on the rockflll cotnued throughout the flooding of the upstream reservoir and the partially constructed rockfill portion held back the waters while discharging water through the rockfill to the downstream.
By February 4, 2014, the flow had increased as the reservoir rose behind the dam, and even with the extreme water flows through the rockfill it maintained its stability and resistance to erosion.
Tokwe-Mukosi Dam is a Concrete Face Rockfill Dam (CFRD) under construc'tion.
              ~Even                          one week later February 9, 2014, when the flows had reduced, the rockflll maintained its stability and resistance to erosion.
It consists of compacted hard rockfill shell and had an upstream sloping transition rock surface in preparation for the future reinforced concrete facing, when the flood occurred.
              ~The                          construction of the rockfill continued throughout the flood conditions and when the flood receded the rockfill would be restored and repaired.
The dam was partially constructed when the rising waters duning the extreme flooding came within five feet of the crest, infiltrated the rockfill and eventually washed through the rockfill in a long and extreme process. The rockfill passed extreme flows for an extended time (two weeks). With the iong period of extreme flows, portions of the downstem slope began reveling but the rockfill embankment maintained overall stability.
PAG    C.2-1O
Thus, the Tokwe-Mukosi Dam, a compacted rockfill shell embankment provided high resistance to erosion, even during extreme flows through the rockfill, similar to the Hell Hole example above. The dam withstood extreme flows for several weeks and only experienced local downstream raveling.
 
Therefore, the Jocassee Dam, which is truly a rockfill dam, will provide the best resistance to erosion and can be considered a low erodibility dam.P A GE C.2-9
APPENDIX C.2 The construction of the rockflll continued throughout the flood conditions and as the flood receded the rockfill was restored and repaired. See the following photos of the various stages of damage during the release of the floodwaters:
&#xb6;7f'm'~ V~r ~ 't~ '~'iW ,~1t'~ ff'r j~rr TI? VFf I I ?fff(IEJ APPENDIX C.2 Tokwe.Mukosl Dam Construction of Tokwe-Mukosi Dam on the Tokwe River in Zimbabwe began in 1989. The dam experienced a flood during constuto when the partially completed rockflhl portion of the embankment was subjected to a flood that raised the upsream level to within five feet of the crest.The water emerging, from the toe of the downstream rockflhl shell on February 2, 2014.Some rock has been eroded.By February 4, 2014, the flow had increased as the reservoir rose behind the dam, and even with the extreme water flows through the rockfill it maintained its stability and resistance to erosion.~Even one week later February 9, 2014, when the flows had reduced, the rockflll maintained its stability and resistance to erosion.~The construction of the rockfill continued throughout the flood conditions and when the flood receded the rockfill would be restored and repaired.P A G C.2-1O APPENDIX C.2 The construction of the rockflll continued throughout the flood conditions and as the flood receded the rockfill was restored and repaired.
P A GE C.2-1l
See the following photos of the various stages of damage during the release of the floodwaters:
 
P A GE C.2-1l APPENDIX C. 2 P AG6E C.2-12 L.QIIWOn:
APPENDIX C.2 P AG6E C.2-12
oeUrUfU Uf.rmllUfWon
 
-WWIIImOW ,Vf pUDllc per TO (;;PH L.3UO'0)Appendix D Detailed Data Supporting Xu and Zhang Revisions ti-G I I Id ma'm aom I-k41 "t4i ailIml~0 #itt af+IIQ ml~lu+ it.5~4 lea.~ .4~0 ao(+w)11 tit ma 1,4-Vo, 4.t 5lint ill+.,+--a-w +at'-.3.WI 3.3.u.;' m 3.p.* -..w, -a--~4.-t ~ -~ 'alt WI ----"~ ~s a..,~ .~a-'--3. tilt I a.- a-ma rn.".4.*4* ,'.4 .tt> 11 3. -, in.a a-4 31W a--43. insl~-tal.4.3t 4 3' 3. tea'n>' 14~-, Wlea*5 NI K*~Mt~ 314 3. 13.4 S4 p.31W 34- sat.-'*44* 14 3. 3.~t3'~.-ma K-K -ma--a-~t ~3..4I3 I 141 I lit tat itt 5* ~tt Itt ad Lit Lit St St Sits sta tat*13 ta&#xb6; ~t tis .is tti tat t'a..[I a ti -~ U at U 54 Itt 3' 15 1, itt*2 Ia as itt'at i.O.0 3'3.35 WI p 3, flit Li Is St Isa at a as I I 13.13.a.13.tat ii) 31 tat at ~so tat, U~-ii&deg; ~ a.** t .6 ( a I_ i+;ii II+ I.am,+ ,, +t 4 aaWma a g qaaW-~m~l a--.I Om...... -- " --" + + Ill I .............
L.QIIWOn: oeUrUfU *uvWW Uf.rmllUfWon - WWIIImOW ,Vf pUDllc *sIV/OSurw per TO (;;PHL.3UO'0)
ram, ........ ;
Appendix D Detailed Data Supporting Xu and Zhang Revisions
t11 1444 IIG -Ira(10!, me ~me 4~WIA-a-4.l&#xb6;me 031 38~ 18-a WI'-a 038*8'-a 418S4 048l~w L&ISO [ll $3 401 #41 *34 34 031 1141 1141 418. 418.US. 0461 ml 0651 31mq ~4W L e: 8. 3 4004W a-, aa... 448 18~ ml 0*0'~ww 048 00~4 054 m'Nil Wq 1441 06W~154 03~ 654-ml.., 4144 48 1844#~4WI 1*118048 .~ 8*1 1413*8 48.4,48-s 0401 d~W 41 10*04'-##C'~3 '*144 10*1044048 184 A 118041 6503 0.034418418181 8*04 03 48*WI A Is-. --44451 -~,Ia-A~ ow.0*044* 4*1065 034 0*14441151065 Ill ~ 05~ 4~4 49 35 09 4404 *44A 1144 03. 604 404 NI C 00(41 *4 N 19 Ii. 844 #4 CCI 011 1418, OSlO 4435 34 CCI 0$ 9044 34 004 9414 31 149 04 [Ii]I 010 015 045 0440 3444 4441 040 Il~SC IC 61 49 044 #44 160 '*4 1441 141 1441 154 44, 0$$$O I 044 43S 31 444 IA 04 5$44 14Cc AC 31 440 44 41 *14 34 44 All 04 44444 dl ~35 34 144 04 4411 SP0~ W~*1414 C h ,*.,, m!" 65 31 3'50 4*44940 01$4 III 044 CI 944 04 II 044 Cot 1419 18o*344 AC 44)1440.4 04 Ill 3mO i3 *1 '11841148M*l3 I'30'18018*a 8*4 0*4034 48103$-4*lpll13-~6581 II 8*0 1048651 180*014--465- 8*104 403 j 5~4  ~ I l0S'0 ~44ls44 44,4 ,0414 4,411 003$ 184 Iv*0*I 03'. .44 34184 '44 IIWOI _____ 44*8* ~ ~ 4$04*1 udWI 1*65*11~w. l~ I '.0*3&034445 p0l5NQ wIr IWI'14~ *8*~4*18$48-w*0~030144 65083 034* -- ~*8~ 14480.8A65 4483'. 4354 404833015034 NiA3'fr0a444~340142344IT1~444~)15l 344004144 44401 A"0 40~03 ~ 44 44dC64.VA103'IISAPMO 50344144434*440 3~ 1303483 018 S34T WI 465(3 3~
 
I-O~)d e~.q oa u~ m. u~ 'm~v~ ~-'-, as. be. -~ I*4* *S~~~41 S-a~.o ,0~ *34~s0 bm.~h~ 3W1-~ -we'~0 0 Ut.-.1-c. 440*00 m4~~~4400*1 *40* *4* ~0~4 k~6w hot I 401----e bebeI+, war mII 400 *.O .Im.+dO1, o t eA+ + I+ .~ +4n me -w+ l+m wl, 3*S+am., -~
ti-G I I Id ma'm 5~4 lea.
P. e(* ft 1 3, 44 44 *1. .4) 3, 044 41 p eer 4W flU 019 I...E.LJ ~3S 3, ~ 1**0. 9* 44* II MAO .43, 3, ~* 14*41* 4*. ~l4 3, f~I ,II I-SI$4 41 It* ~.* We ~ 34 W4~ 04*.0 01* *01 944 90. ~ 3, 09. .ft 14 0* U 4? 434 3, 0 0*4 1* 0 .4 *~0 t34 44 .4~4 90 4* 44 44 4* ~14 i.1 3, 1~0 1.0 9 114 ~0 0 a.a.a.*94*9.&#xa3;4 a.a.a.Va-c'n0w1 kW4lllll1 4.113nW)4-a ip 0,, me.w lit-K , +0wAW0140s.~3,MO~V9~k4~43,4 3044*4*01 0* ~ 14~ Q.d ~iurUpo3401*0
                                ~       .4~0                                                                                                lit          tat  itt    5*        ~tt  Itt    tat      ii)    31    tat  at    ~so tat, ad      Lit  Lit    itt              3'         a as flit        13.              U a..,~        .~                                                                      i.O a-'--
$3,S0wk9~
I      aom                                                                                  3. tilt            I                                                St  St      *2              3.      Li        13.      ~
i0m0~*9* I4W, I~ ~) 3,A~3ff o-Jo'v--. +j -m .... ....m ...+ -,J -_
          -    k41    ail "t4i                                                                                          a.-    a-
1-1 1!114 a pmlW N-m~~U 4'.D661N mum 'um~466 ~ Ash.-, ~b.. ~ 3)IlI~ ~ LL52J.~.!..~L.L.~f~]
: 3.                                              ma rn.                                       Sits      sta  tat      Ia              35      Is
P4 El I m~ I V~I OP~~~)sh~66K ~ ~e has m ICI &#xa3;I~ ~ 1461 I his 16. 144
                                                                                                                        ".4.
* ICC P. .tt Am ~. ~I ~Ct. E 1. IV tI Its Nt dN 3' itt ~S 6 4 4. 665 tht 6W ~P4 Pt A41 Lit t~ ~a'666$ ti tA 9 ass ass 946 0 P. 641 a.s 1). is tiS 6th t44 tE SE t* 11~ 3' t61 114 ~SI 9464 IW~51 554 iS $6~ 66 L4T~ Pt W $4 6~ .isi rfl 411 511 sAW t4~ iitq s~ ~EU 1,3 tiC Ii 6* 5? 91* 35 .115 3' A4~ 111 661 IE -m. ma"4 is his Em-4W 3' 31 1U4 6.mItsss.-~P.)~11 5~ Iii,~34661u46446, LI-ma~m6 65*1 iiishsi ma~1t6S4bNI.
                        -I+,*                                                                                  *4*                ,
WI        3.                                                          I *13        ta&#xb6;  ~t  tis .is    tti      tat  t'a..            .0                  II as              WI    St          a.
Iml~0  #itt    af
                                                                                '.4    .tt>      11        3.   -,    in.a  a-      [I      a  ti -~    U    at    U        54  Itt    itt              p    Isa
      +IIQ ml~lu+    it.
4 31W 3'        15  1,    'at              3,    at          13.       -
a--
: 43. insl~
: 3.                                    -          tal.4.
3t                                      4 ao(+w)11      tit    ma                1,4-Vo, 3'        3.       tea'n>' 14~                         ii&deg; a'*.a                  ~ a.**              t        . 6              (   a    I 5lint 4.t
                                                                                                              -,         Wlea*5 ill+.,+             u.;'     m         3.
        - a-w                      +                                                NI                                      K
                                                                                *~Mt~           314      3. 13.4        S4 4
aaWma p.
31W                          34- sat.-'
                                                                                  *44*          14      3.       3.~t3'~.
a at'
                                                          .. w,
                                                                    -a-
                                                                    ~4 p.
K-K      -
ma-
                                                                                                                  -      ma a-
_                                            i+;ii II+ I                                                  g ma*~l qaaW
                                                                                                                                                                                                              +t    .am,+,,   *a.*
                                                  .- t ~         -~       'alt WI      -
                                                      --- "~       ~s
                                                            -~m~l    a--.I    ~t         ~3..4I3           I 141 Om
                                                                                    ......          --    "                          --  " + +    Ill I            .............         ram, ........  ;
 
t11  1444 I
                - IIG Ira(10!,                                                                                                               ISO    [ll    $3    l4I*    #14* 401        #41
* 418S4 048l~w L&
a-,
aa...       448
                    *t4l                                                34                      18~        ml  0*0' Ill       ~  05~        4~4      49            35      09      CCI                34    CCI      0$          9044 38~  18                                                        ~ww          048 me    ~                          -a                                    34                      00~4 054      m'                        4404 *44A      1144 03. 604          404      011      4435      34                    004  9414 me    4~WIA WI' Nil Wq 144106W~
154 03~ 654-ml.., 4144 48
                                                                                                #~4WI 1844 1418, OSlO              31      149    04    [Ii]            SP0~ W~
I 1*118048.~ 8*1
    -a                                                                                                 1413*8
  -       4.l&#xb6;                                                                                     48.                NI        C 00(41 *4      N      19    Ii. 844      #4    044      43S      31    444      IA    04  5$44 me 031 1141 1141
                                  -a 038*8'
                                  -a
                                                              ~ 31mq                                    4,48-s 0401d~W 10*04'
                                                                                                - ##C'~3 '*144 10*1044048184 41 010 0440 015  045 3444 49    044      #44 141 1441 14Cc 41 AC
                                                                                                                                                                                                  *14 31 34 440 44 44 All    04  44444      C
                                                                                                                                                                                                                                                      *1414 m  !"
A 118041  6503 031              418. 418.                                                                   0.034418418181 4441          040  Il~ 160  '*4     1441         154             dl      ~35        34            144    04  4411      h    ,*.,,
4WL      e: 8. 3 65 8*04 03 4004W                                                          48*                                                             $O WIA Is-.    -
US. 0461                                                                  -44451          -~   SC      IC    61    50    4*       044  CI    44,              Cot      *344                      .4
                                                                                                  ,Ia-A~         ow.
ml                                                      31                                                    44940 01        944  04                     1419 0*044*       4*1065                                                                               AC                      04 1440 034 0651                                                    3'          0*14441151065                             $4  III      II    044    0              18o        44)                    Ill i3*1  '                              '30' 18018*
I
                                                                                  -      ~6581 a      8*4         II    8*0 11841148M*l3 I            0*4034  48103$     1048651 180*014 465-    8*104 403~44ls44 l0S'0        j 5 ~ 444,4      ~,0414                      4,411 4*lpll13 3mO                                                                                            48-003$    184          Iv*0*I             03'.            .44   34184  '44 w*0                                      IIWOI                                                    _____  44*8*    ~        ~    4$04*1  udWI        1*65*11
                                                                                                                              ~w. l~                                                                              I    '.0*3
                                                                                                                        &034445 IWI'14~                    *8*~4*18$                 p0l5NQ    wIr
                              ~030144                          65083  034                                                                                                                      *    -- ~
                                                                                                                                                                                *8~       14480.8A65 4483'. 4354    404833015034 NiA3'fr0a444~340142344IT1~444~)15l 344004144 44401 A"0 40~03 ~ 44 44dC64.VA103'IISAPMO        50344144434*4403~ 1303483 018S34TWI    465(3 3~
 
I-O~)d 3,
e~.q        oa 44    44      *1.     .4)  3,  044  41 a.                  'n0w1 al*~+
I 401----e ip  0,,
p u~                 m. u~               '0~4                                                              eer    4W    flU    019  I...E.LJ    ~3S    3,  ~     1* a.                  kW4lllll1 m~v~               ~                       k~6w                                                              *0. 9*    44*   II      MAO      .43,  3, ~*    14* a.
4.113nW) 4*.
I-SI 41*            ~l4            3,  f~I  ,II *94 bebeI+,war
  -     '-,         as. be.     -~       Ihot mII                  400  Sb*
                                                                                                                $4     41    It*   ~.*       We  ~         34 W4~   04* *9.
me.w 4-Va-c
                                                                    *.O .Im.+
                            *4*    *S~~~41 S                                                                    .0    01*   *01  944      90.      ~     3, 09. .ft &#xa3;4 dO1, lu**t                          o t eA++         I
                                                                +     .~   ib41*
                                                                                +4n
    -a~.o            ,0~    *34                                me -w                                                 14    0*    U        4?    434    3,   0    0* a.
                                                                +    l+m            wl,         3*
    ~s0 bm
    .~                                                                                                          4    1*     0    .4      *~0      t34    44 .4~4  90 a.
h~        3W1                                                S+am.,          -~
  -~
    '~0
              -we 0          Ut.
be4Wtl*F7  P. e(*         ft    1 4*   44      44    4*       ~14      i.3, 1~0  1. a.                            lit
    -. 1-c.
4400*1      *40*
440*
                            *4*     ~
00 m4~~~
0     9       114     ~0               0
                                                                                                                                                                                              -K
                          ,        +
m*
0wAW0140s.~3,MO~V9~k4~43,4 3044*
4*01 0*  ~ 14~      Q.d ~iurUpo3401*0 $3,S0wk9~ i0m0~*9*         I4W,    I~ ~) 3,A~3ff o-Jo'v
                                                  * - -. +j -m .       .       ..   ....                         m.   .   .     + -   ,J - ,*      _
 
1-1 1!114 a m. ma pmlW IlI~ ~                     LL52J.~.!..~L.L.~f~]         P4       El I m~ I       V~I     OP~~~)sh~       "4 is his 66K                         ~     ~e         has       m       ICI     &#xa3;I~     ~   1461 I                 Em
                                                    -    m~
N his Ct.
S E
6    4
: 1. IV 4.
16.
tI 665 144
* Its tht ICC Nt 6W dN
                                                                                                                                  ~P4 P.
3' Pt
                                                                                                                                                    .tt A41 Am itt Lit
                                                                                                                                                                  ~.
t~
                                                                                                                                                                        ~
                                                                                                                                                                        ~
                                                                                                                                                                        ~I          ~
a'
                                                      ~U 4'.
D661N mum 'um~
466 ~ Ash.
                                                  -,      ~
b..      ~        3)        666$      ti      tA     9 ass   ass       946     0   P.       641   a.s     1). is LI
                                                    -        ~
5~
P.)~11      Iii,
                                                    ~
                                                    - ma~m6 1U4 4W  3'  31                            65*1 iiishsi 34661u46446,                           tiS    6th    t44  tE    SE        t*    11~ 3'       t61    114    ~SI  9464      IW~51 ma
                                                    ~1t6S4bNI.
41b~6Yh96$
41b~6Yh96$
-5115*11 5651 31 9~16 @~Wma~*~1 Pt 3~ ~ LE+/-..J~*4 1414*11 a a.*~I-~ -I'm isil'S is& I~ 12 1~,~'$s pa" ~.. I'a is. m ~ *~ 551164 ma 1665651____ -w ___ ma ma '55W- ~4~M ma -map 14 U6l~3 ma-6-~~u~-'-w Ugh isuiC4Wis,~ 3W) a..641 ~11 t6m4 0~ ~ ~ *0 *1A3'65 o a~tdvv igYd&lO Nb.4 Nb~ ~ 1.4-~ j 1d34 9.4.wmwi&qj q. 3 3.4 in-U,.'-'-4~Nb~U4 3. 543w~MI Nb i. Rw4~o 4, Nb i~140 t~Nb Nb U~C .3 0.-~ F~1-II I4~41 Nb ~ I.. 3.0 ~U it A.4~ 3.43.4 Nb U. 13.09 SO 3 It4 Ij L S ZOt 4 at imwin 4U1 Nb 34-~*4 U.4 .441 mt 't UW 3..3. 3. 34-~ -5. .3. 3, 34 3.,-'0 13.3.0 K.3.34,-, I. 3. 44 ap'3. 19 4)? 3, tiC NW 3. a Ot 4).34 .0 i* 4)4 Nb Nb.lI.m- *-r is Nb 0, lul UNl LPite 43 31 34 3.43343.3.-w&#xa2;U, C .0 d. 3. ;O .(0 4..41 C at II 4 U 14 14 09,6 .431 TI 0.0 ii 111 U~3..-.ew..9-' .4~3 -'~Nb' NbA~ 3.~-~~i ,,__ Nb Nb Nb I,-Nb-p] T T I .,,.,. ,,too-am. ~j-3.3.~ ~14-~Nb ~m9-. 3.33Nb NbNb3~Nb3.3 34WJ~W3.UmV'~B0~Q4W4 W14.01W 33 ti 449-i G'od u~&vy ~ ~ 34)frC~TW.  
                                                    - 5115*115651 rfl 31     9~16 @~Wma                                             554 iS    $6~        66  L4T~  Pt        W      $4          6~          .isi        'S
~4 O3md mw, ~i m ----
                                                                      ~*~1 6.mItsss.
ApmD O~ O$7~S~E.S F4~ c33W~4~L3TA13O33
Pt     3~       ~             LE+/-..J                                   411  511      sAW    t4~           iitq    s~      ~                            is EU    1,3  tiC    Ii    6*     5? 91*       35  .115  3'      A4~   111    661  IE  -
~ ~ ~33333 31~1 3.i~ESmoHhw~5~S4m~YSA 33.~33 m~wm -~-,'En UUa33.I I I I O ""L,! ,- -'"I,,_ 4_I33 I 3 -..... 2 ..Tm~mm33 Nm--~ -~4'-~ ~ ____-~3-313 mcvmi wg m 33 U,~gC. USA 34) 3333 34) ~ lIP [11ii '~ ~' ~' '~ ~39'qsw. cNm 41 34 2U L i 01 139 U U TO 33~m 34) ~1, 143 3* 31 3U 134 as' 4~ ~ 3331 0333~ USA 41 ~.3 331~ 3* lIP O3~ 349 349 30 9 343 3~ USA 41 33 3* ~11 3336' 333~3 3333 ill 341 13 3314 USA 330 314 31 W CIT V 43433 3)3 W 333 313 4 T 3~ CI 93 334 LT] lI~ 3333 174 33 flIt 443 .33 3 393 4 2334 CNm 41 33 933 3* 31 333 '1 '2 93 m ~ 33 w 3W 39333 33~*033@33m~mm 3~3949 3933 W3971 mm~--3d,?~ .49334-391493q~n. ft.--mm,~9~33Nm39 49~33-21.34mm 34 9333*b~3 343* ~33 mm143 3Nm 3914494, 33k ~33333 3394,9 ~3d,~4*3*34 34 M' '~33~349 3 3349 Tm 3393* 33~9 C4*~1 33 33373 33-~49* ~93 339 39333 13,mgo34 3933 ~94993 33333 3973 3349w.-393? 333 ~33m6Ni43 3333* ~ 3*1339 3334 I &#xa3;.q3N.-34'37233*3334 3913. 3939 ~39ebfi -393 3971 '~m~333393 3934 3~W~ 333,349,33 1 3* 39*.mm U, 33~q~w. 1~ 41 1.) 34 3* 33 4' 34 39 43 3* 3* ~,-~33 mm 7mm.Sf933336 3334 3*4 '~ L i 3* 3*33 '49 3333 3314 1333 346 13 391 3* 3 .3 ~ p,.'9--3331 '~733'4 3.3. .~I '" I i 33*G33 a v 3m,&#xa3;444 twaW-a 'ma~34*.4 3. 3 34&~ ~_ _ _ ' 3-I w~Ph ..P U-.,'9 34 3' 3 9rag,9.ama ..ua. ma~8~j ai9 ma*4*~ -I mama.urn.ma ," ~9 ma PU ma ma..4~-* ~9.4'-----i'--U4W4dU*4 A*44in9 PU.ini *51-WA'199 94 9' 914 10&#xa3;94 &#xa3;9. 99 10~* it. 19. ~.&#xa3; ,9 Pu -~ AC 911 & ~&#xa3;t ~&#xa3;&#xa3; Ca &#xa3;11 It'll d~34 3.34..o a.9. ~4'UP (.~It'm0 m-if if U 10 34 Wit UA if~ 944 Ul All Ill &#xa3;994 10 34 a. if ~a ~~i4 Ill NI em ma a. K 9 Ia 0~ i. 10 3~ ,4 U 4.141 ~ *~ 99,1 941 919 WA 10 3' Ill __ ___ _____-~. 1 9--__~ .~14 ~'m~mw I sWa wm~ma ma Pu m19, AWU~E3'39I~3UZM~*U4
                                  ~*4    1414*11
~9~I4 UK a'9 'ama OW ~9S~U ~W~A t34$3'A34) 3~~GN~9WaU'3
                                                                                ~
~UA3'a.4-~ 'ap pm~ *OEM__z z: ..... .- _: .... 2... 2-: .- "3: n L- -g .........
12 I                    1~
.. .......
a    a                                                                ,~'$s           pa"                   ~.. I
                                  .*~I-~  -                              I'm                                            'a                                                                       14 is.
m
___ ma
                                                                                                ~ma    *~         551164
                                                                                                                    -w
                                                                                                                  '55W-           ma          1665651
                                                                                                                                                ~4~M                                         U6l~3 ma map  -
isil
                                                                                                                    ~~u~-'-w             Ugh isuiC4Wis, ma                                                                                              ~                                       3W) a..
641 ~11   t6m4   0~ ~                                 ~                       *0 *1A3'65 o a~tdvv
 
igYd
                                                                                        '-'-4
                                                                                  ~Nb~U4
  &lO     3a*j
: 3. 543w Nb                                               .4                 ~MI Nb
                              .wmwi
: i.        Rw4 09    3*    It4 Ij SO        L        S      ZOt      *Q4        at  im Nb~             ~     1.4                                                                             ~o      4, Nb    i~                                                                                      win
                                        &qj   q. 3     3     .4
-~             j1d34  9.4                                                                                               140 t~                                                                                   4U1 mwnmn*
Nb in 34 Nb Nb
: 3.        a    Ot    4).
U~C   .3 0.
  -                    U,.                                                                                                                      I. 3.        44        ap      34        .0    i*    4)4
                                                                                  -~
F~1 II 3.0 ~U 3.
I4~41 Nb         ~           I..           '3.       19 4)?  3,        tiC it A.
NW 4~             3.
43.4 Nb
-     ~*4       U.4   .441                     .3. 3. 34                                                         U. 13.
mt      '
                                -~           -5. .3. 3,   34                                                                                                                                                         .41 U,     C                    .0         d.       3.       ;O      .    (0   4.
                                                                                                                -w&#xa2;
                                                                                  .lI.m-          *-r 3Ili~,**Ii is  Nb 0,
3.,-
13.3.0 K.                                                         UNl t    UW    Nb   Nb                                                         lul NSa3.3.*
                            '0 LPite 43 31 34   3.43343.3.
3.34,-,
C       at   II     4     U     14     14     09,6       .431     TI       0.0   ii     111 U~
                                                                                                                                                              ]          T
* T ew.
                                                      .9-' .4~
                                                                      ~i  ,,                                                                                    I,-
3   -
,hie*            3..-.      '~Nb'   NbA~                                                                               __  Nb          Nb ammmm**,mm                                          3.~                                                                                                                                                                             3.
                                                      -     ~                                                                                                               n:*l      ,,too          -    am. ~j            ~ ~14 mw*
Nb Nb I .,,.,. I*
                                                                                                                                                                -p                            -3.
Nb ~                     -~
mm*
m9-.       3.33Nb               NbNb3~Nb3.3 34WJ~W3.UmV'~B0~Q4W4                             W14.
01W 33 ti 449-i   G'od u~&vy         ~                             ~   34)frC~TW.   ~4 O3md mw, ~i m-                   -       -               -


I~l~L LdP,.....,.JIU..  
ApmD O~ O$7~S~E.S F4~ c33W~4~L3TA13O33 ~      ~          ~33333 31~1 3.i~ESmoHhw~5~S4m~YSA                                                                                          'En 33.~33 m~wm        - ~
-- IIIIU Ul~l ...PLJImL. I i-- --.. I.:............. ---j 5-..-----I,lw Appendix E.. , -. Mark Morris Review  
313  mcvmi                                                      349 Tm UUa33.                                                                                                                          Nm
....... ... h w t &#xa3;;
                                                                                                              ~mm33 IO I              I        I      *      ""L,! ,-              *      -'"I,,                                    -            -~    -~
s ,; IlwIl&#xa3;.IU 2 Appendix E jocassee Dam: Independent review of breach prediction methodology and supporting analyses outlined in the technical report:, Validation of HRR Breach Hydrograph for Jocassee Dam: Through an in depth review of the Xu' and Zhang breach parameter estimation methodology.
_ 4_I33                I *3 -          . ....              2          ..                              -    ~
March 2014 Objectives:
                                                                                                                                                                  -      ~
An independent review of the work undertaken to validate the approach taken for analysing the potential failure ofthe Jocassee Dam was undertaken and is reported This comprised a review of the technical report (Validation of HRR Breach Hydrograph for Jocassee Dam) and some of the associated  
                                                                                                                                                                                ~                ____
/ supporting material (as referenced in that report). The review was undertaken by Dr Mark Morris, who has extensive experience of both research .into and industry application of breach analysis methodologies, see attached resume. The following provides a summary of key observations.
4' 3  3349 C4*~1 Tm 33 3393* 33~9 3-33373 33-~
49* ~93 L~i          [11ii 339  39333    13,mgo34 m ~          33    w wgm
      ~gC.      USA    34)    3333  34)            lIP            '~    ~'    ~'  '~    ~                                                                                                                  3933          ~
3W 3933333~
39'qsw. cNm    41      34  2U              01    139      U      U    TO                                          *033@
94993 3*      31    3U      134  as'    4~ ~    3331 0333                  33m~mm 3~                                                                                33333 3973    3349w.
33~m    34)    ~1, 143 3949 33 3933W3971
                                                                                                                                                                                                            -  393?  333        ~
      ~          USA    41    ~.3  331~    3*    lIP    O3~      349  349    30  9  343    3                                                                                        3394,9 ~
33m6Ni43      3333 mm~
                                                                                                                        -        -      3d,?                                                          3d,
                                                                                                                                                                                                      ~4*
333~3 3333 ill  341    13  3314                                                                                                      *  ~                3*1339 U,    ~          USA    41    33          3*      ~11  3336'                                                                                                3*
                                                                                                                      ~          .
49334 313    4                      -                                      34    34  M'      '~33~                      3334      I    &#xa3;.q3N.
LT]
USA    330    314  31    W        CIT    V    43433 3)3    W  333                                        391493q
                                                                                                                                                                                                                                        -34
                                                                                                                                                                                                                              '37233*3334
                                                                                                                          ~n.      ft.
CI    93    334          lI~      3333    174  33    flIt 443  .33    3  393  4    2334 -    -      mm,                          3*                                            3913. 3939  ~39ebfi -
T      3~                                                                                                                                                            39*.
                                                                                                                      ~9~                                                                            mm CNm    41      33  933    3*      31    333      '1    '2    93                                      33Nm39        49                                                                      393  3971    '~m~
                                                                                                                                ~33-U,    33~q~w. 1~      41      1.)  34    3*      33    4'      34    39    43                                                        3* 3* ~,-
333393
                                                                                                                                                    ~33 21.34mm mm 34 9333*                7mm.
Sf933336 Li b~3 343*      ~33                                                                      3934 3~W~ 333,349,33  1 3*    3*33    '49    3333  3314 1333  346    13  391                                                            3*    3  .3      ~      p,.'9 mm143 3Nm 3914494, 33k ~                                                  -      -
3331'~733 33333                                        '4 3.3. .~
33343*4 '~
I * '" I                                                                                                                              i 33*G33
 
L*a v ama ..                                        if  if    U        10        34  a. if  ~a ~          NI ua. ma
                                                                ~8~j            ai9    199 Wit UA      if~  944  Ul  All  Ill  &#xa3;994      10        34  ~i4  Ill                  em 3m,
                                        ~34*.4      3. 3
                                                                *4*~ -
ma I                                            94  9'    914      10        34  .. o  a.      'm0 mama.
            &#xa3;444 twaW                                                                                                  &#xa3;94  &#xa3;9. 99      10        3. 9.  ~4 urn.
ma a    -    'ma                                            ," ~9 34                                                            ~*    it. 19.  ~.&#xa3;  ,9  Pu  -~        AC            'UP                    m-(.~
ma PUma ma
                      &~ ~                                                                                  ~&#xa3;t  ~&#xa3;&#xa3;  Ca  &#xa3;11  It'll    d~
911    &                                              34        It w~
Ph  .. P            .. 4~-* ~9.
4'---
U-.,
                                                                  - -i'--
_    _      _          '  3                              U4W4dU
                                          '9  34    3'    3      *4 A*44in9 PU                ma      a. K      9  Ia  0~    i.      10        3~    ,4    U 4.
9rag,9.
141    ~    *~    99,1 941 919  WA        10        3' Ill  __  ___      _____
a.
                                                                                                                              -    ~.              1 __
9-
        -I                                                            .ini        *51
                                                                                                                      ~                                .~
                                                                                -WA' 14
                                                                                                                              ~'m~mw                            I 4
sWa wm~ma                  ma Pu m19, AWU~E3'39I~3UZM~*U4 ~9~I4
                            -~  'ap            pm~
* UK  a'9 'ama OW ~9S~U          ~W~A t34$3'A34) 3~~GN~9WaU'3 ~UA3' OEM
_-+z*zg __z z: .....          .- _:....      2... 2-:      .-      "3: n L- -g .........        ..  .......
 
*ldij,,.[ll~III**I I~l~L     il]*IILV LdP,.....,.JIU.. -- IIIIU Ul~l ...PLJImL. LI**I
* I      i--   --..         I.:
.............     *-  - --j                                                               5-..               -----     I,lw Appendix E Mark Morris Review
 
.     ...... h ...w t     &#xa3;; nu*..-.m- L..*s.....J. s                   ,;                     IlwIl&#xa3;.IU         2 Appendix E jocassee Dam: Independent review of breach prediction methodology and supporting analyses outlined in the technical report:,
Validation of HRR Breach Hydrograph for Jocassee Dam:
Through an in depth review of the Xu' and Zhang breach parameter estimation methodology. March 2014 Objectives:
An independent review of the work undertaken to validate the approach taken for analysing the potential failure ofthe Jocassee Dam was undertaken and is reported here.* This comprised a review of the technical report (Validation of HRR Breach Hydrograph for Jocassee Dam) and some of the associated / supporting material (as referenced in that report). The review was undertaken by Dr Mark Morris, who has extensive experience of both research .into and industry application of breach analysis methodologies, see attached resume. The following provides a summary of key observations.
Observations:
Observations:
I Broadly -because of the nature of breach initiation and growth, it is impossible to predict the precise way in which a breach might form. Instead, a best prediction may be made, around which the degree of uncertainty and sensitivity should be examined.
I Broadly       - because of the nature of breach initiation and growth, it is impossible to predict the precise way in which a breach might form. Instead, a best prediction may be made, around which the degree of uncertainty and sensitivity should be examined. This is the aipproach which has been undertaken for the Jocassee Dam failure .analyses, which is consistent with current good practice.
This is the aipproach which has been undertaken for the Jocassee Dam failure .analyses, which is consistent with current good practice.2 There are different degrees to which the breaching process might be analysed, ranging from pure judgement, through the use of equations based on historical failure data, through to more complex predictive modelling.
2         There are different degrees to which the breaching process might be analysed, ranging from pure judgement, through the use of equations based on historical failure data, through to more complex predictive modelling. For this analysis, the use of equations based upon regression analysis has been undertaken - and a potential 'flood hydrograph subsequently
For this analysis, the use of equations based upon regression analysis has been undertaken  
            'bUilt' from this information. This decision defines the broad approach and hence the
-and a potential  
            .degree of detail that may be attributed to the hydrograph prediction and the associated uncertainty in the prediction.
'flood hydrograph subsequently
3         Over the years there have been many equations developed to .try to predict outflows in the event of a breach. The accuracy of these depends upon the parameters selected and the data upon which they are based (i.e. the types of dam, state of dam, failure mechanisms etc). A significant advance during the past 10years has been a move to incorporate a measure of soil erodibility within both regression equations and predictive models. This is fundamental to predicting conditions associated with parti'cular soil types and condition. The Xu and Zhang equations are the first time erodibility has been built into such equations, and are therefore considered current state of the art for this type of analysis (i.e. for using regression equations to predict'breach failure).
'bUilt' from this information.
4     Validation of regression equations can be undertaken by comparison against real events, controlled events and predictive models (that mnight be considered to more accurately reflect the breaching process)., In the Jocassee study, an analysis of the development and validation Mark Morris i4i' April 2014 Markmorrissamuifrance.com Page E-I
This decision defines the broad approach and hence the.degree of detail that may be attributed to the hydrograph prediction and the associated uncertainty in the prediction.
 
3 Over the years there have been many equations developed to .try to predict outflows in the event of a breach. The accuracy of these depends upon the parameters selected and the data upon which they are based (i.e. the types of dam, state of dam, failure mechanisms etc). A significant advance during the past 10 years has been a move to incorporate a measure of soil erodibility within both regression equations and predictive models. This is fundamental to predicting conditions associated with parti'cular soil types and condition.
                                                            ,
The Xu and Zhang equations are the first time erodibility has been built into such equations, and are therefore considered current state of the art for this type of analysis (i.e. for using regression equations to predict'breach failure).4 Validation of regression equations can be undertaken by comparison against real events, controlled events and predictive models (that mnight be considered to more accurately reflect the breaching process)., In the Jocassee study, an analysis of the development and validation Mark Morris i4i' April 2014 Markmorrissamuifrance.com Page E-I  
* Appendix E of the XU and Zhang equations was undertaken. This analysis was extensive, covering the nature and quality of the base data used, as well as the method for equation development. This review was undertaken 'around the table' with the originators of the work, including Prof Briaud upon Who's work the categories of erosion used were based. It is difficult to see how a mor'e thorough review of the basis for the equation~s could have been undertaken.
, Appendix E of the XU and Zhang equations was undertaken.
5   Inclusion of material erodibility within the regression equations is a key advan~ce, but then requires assignment of values of erodibility     - in this case, high-medium-low, to appropriately represent the material type and state. The review by Prof Briaud addressed this important asPect, and provided independent assessment of the likely erosion :category for Jocassee. This approach is consistent with industry good practice for breach analysis.
This analysis was extensive, covering the nature and quality of the base data used, as well as the method for equation development.
6     In addition to checking the Original data and developmen~t of the predictive equations,.new equations have been developed using openly accessible case data (iLe. excluding Chinese data which is not available outside of China). This remoyes any uncertainty relating to the quality of this data (even though that issuewas addressed through careful consultation). Tlhe results from the new equations are :broadly consistent with the earlier predictions.
This review was undertaken  
7     Having undertaken ~an extensive assessmentof the regression analysis methodology         -
'around the table' with the originators of the work, including Prof Briaud upon Who's work the categories of erosion used were based. It is difficult to see how a mor'e thorough review of the basis for the equation~s could have been undertaken.
including development and testing of revised equations based Upon openly accessible data -
5 Inclusion of material erodibility within the regression equations is a key advan~ce, but then requires assignment of values of erodibility  
it is worth remembering that there are practical limitations to'the accuracy with which any regression equations can predict the breaching process. These have been carefully considered and discussed in the report; if a more detailed analysis of the potenitial processes is required then it* is likely that this would only be achieved through undertaking more complex predictive modelling.
-in this case, high-medium-low, to appropriately represent the material type and state. The review by Prof Briaud addressed this important asPect, and provided independent assessment of the likely erosion :category for Jocassee.
8     The approach adopted for prediction of the flood hydrograPh makes use of the NEC RAS flow modelling software, within which there is a module designed to simulate growth of a
This approach is consistent with industry good practice for breach analysis.6 In addition to checking the Original data and developmen~t of the predictive equations,.new equations have been developed using openly accessible case data (iLe. excluding Chinese data which is not available outside of China). This remoyes any uncertainty relating to the quality of this data (even though that issuewas addressed through careful consultation).
      .breach and the associated production of a flood .hydrograph. The approach has been to use parameters predicted by the Xu and Zhang equations as input to the HEC RAS breach module, and to adjust various breach parameters slightly to match the peak discharge predicted from the HEC RAS model *to the Xui and Zhang equation. This approach is sensible and allows the creation of a realistic-and representative flood hydrograph. There are likely to be some variations in the hydrograph descriptors in comparison to the regression analysis, since the two approaches accommodate different parameters. However, these differences should be within the typical ranges Of uncertaintY as'sociated with: breach prediction. Of all the parameters describing a breach flood hydrograph, the peak discharge is probably the most reliably predicted, hence tying the t~vo methods via the peak discharge value and ensuring that the hydro gr'aph volume matches the resei'voir stored volume helps to limit uncertainties.
Tlhe results from the new equations are :broadly consistent with the earlier predictions.
7 Having undertaken  
~an extensive assessmentof the regression analysis methodology  
-including development and testing of revised equations based Upon openly accessible data -it is worth remembering that there are practical limitations to'the accuracy with which any regression equations can predict the breaching process. These have been carefully considered and discussed in the report; if a more detailed analysis of the potenitial processes is required then it* is likely that this would only be achieved through undertaking more complex predictive modelling.
8 The approach adopted for prediction of the flood hydrograPh makes use of the NEC RAS flow modelling software, within which there is a module designed to simulate growth of a.breach and the associated production of a flood .hydrograph.
The approach has been to use parameters predicted by the Xu and Zhang equations as input to the HEC RAS breach module, and to adjust various breach parameters slightly to match the peak discharge predicted from the HEC RAS model the Xui and Zhang equation.
This approach is sensible and allows the creation of a realistic-and representative flood hydrograph.
There are likely to be some variations in the hydrograph descriptors in comparison to the regression analysis, since the two approaches accommodate different parameters.
However, these differences should be within the typical ranges Of uncertaintY as'sociated with: breach prediction.
Of all the parameters describing a breach flood hydrograph, the peak discharge is probably the most reliably predicted, hence tying the t~vo methods via the peak discharge value and ensuring that the hydro gr'aph volume matches the resei'voir stored volume helps to limit uncertainties.


==
==
Conclusions:==
Conclusions:==


The steps taken here to validate use of the Xu and Zhang regression for breach prediction have been very detailed and thorough.
The steps taken here to validate use of the Xu and Zhang regression equations* for breach prediction have been very detailed and thorough. It is hard to see how rnoredetailed analyses could be undertaken to support the recommended results without stepping from the level. of regression analyses into more complex predictive breach modelling. The key aspects of (i) basis for the equations and (ii) representing the material erodibility-have both been addressed in. detail.
It is hard to see how rnoredetailed analyses could be undertaken to support the recommended results without stepping from the level. of regression analyses into more complex predictive breach modelling.
Makmorrls~samuifran.ce.om
The key aspects of (i) basis for the equations and (ii) representing the material erodibility-have both been addressed in. detail.Makmorrls~samuifran.ce.om
                                                                                            ,~Page E-2
,~Page E-2 Appendix E Mark W Morris Director Company Samui France SARI Profession Chartered Civil Engineer Speclailsatlon Flood risk analysis (Dam and river engineering)
 
Emergency planning
Appendix E Mark W Morris Director Company             Samui France SARI Profession           Chartered Civil Engineer Speclailsatlon       Flood risk analysis (Dam and river engineering)
/ Research coordination YaofB rt r t 6  I Key Qualifications
Emergency planning YaofB          rtr t6            I PJroiecLmna*,lement / Research coordination Key Qualifications
* Dam and Embankment Safety -Dam-break, Embankment Breach, Risk Assessment and Emergency Planning -20 years experience in dambrcak analysis techniques, darn sfafety risk assessment and breach formation prediction at National and International levels supporting the development of emergency action plans. Studies include national and international research into fundamental processes and modelling tools,.prioritisation of operational and research needs ats wvell as consultancy studies, a Flood Defence and Flood Risk Assessment  
* Dam and Embankment Safety           - Dam-break, Embankment Breach, Risk Assessment and Emergency Planning   - 20 years experience in dambrcak analysis techniques, darn sfafety risk assessment and breach formation prediction at National and International levels supporting the development of emergency action plans. Studies include national and international research into fundamental processes and modelling tools,.
-25 years experience in conducting river engineering studies including desk, feasibility, design and environmental studies of river channels, hydraulic structures and flood plains. Experience in the assessment of flood risk, construction risk and the safety of hydraulic structures.
prioritisation of operational and research needs ats wvell as consultancy studies, a   Flood Defence and Flood Risk Assessment         - 25 years experience in conducting river engineering studies including desk, feasibility, design and environmental studies of river channels, hydraulic structures and flood plains. Experience in the assessment of flood risk, construction risk and the safety of hydraulic structures.
Particular experience has been gained in the risk assessment of weirs and dams leading to fiailure of the structures and the analysis /prediction of breach develoPment through emban~kments.
Particular experience has been gained in the risk assessment of weirs and dams leading to fiailure of the structures and the analysis /prediction of breach develoPment through emban~kments.
* Project management, research coordination, training, technology transfer and dissemination  
* Project management, research coordination, training, technology transfer and dissemination -20 years experience in the management,, co-ordination and implementation of international research projects, including various EU funded projects under FP4, FP5, FP6 and FP7. Experienced in the provision of technical courses, workshops and conferences on practical hydraulics and river, engineering and in dissemination of research findings and applications to industry through production of industry, guides, workshops and conference events.
-20 years experience in the management,, co-ordination and implementation of international research projects, including various EU funded projects under FP4, FP5, FP6 and FP7. Experienced in the provision of technical courses, workshops and conferences on practical hydraulics and river, engineering and in dissemination of research findings and applications to industry through production of industry, guides, workshops and conference events.Specialist expertise in the development of wveb based tools and methods facilitating technical project management.
Specialist expertise in the development of wveb based tools and methods facilitating technical project management. and project communication and dissemination.
and project communication and dissemination.
Career Summary 2011 - present       Director, Samui France SARL 2001 - 2011         Principal Engineer, Floods Group, FIR Wallingford 1988 -2001         Graduate to Senior Engineer, Various Groups, HIR Walllngford 1987 - 1988         Graduate Engineer, Potable Water Dept., Sir M MacDonald & Partners, Cambridge Education and Professional Status PhD Breaching of earth embankments and dams. The Open University, 2012 BEng Hons (1st Class) in Engineering Science (Civil), Exeter University, 1987 Member of the Institution of Civil Engineers, 1993 Member of the Chartered Institution of Water and Environmental Management, 1993 Member of the British Dam Society Committee. 1999-2001, 2001-2005. 2005-2011 Member of the Reservoir Safety Advisory, Group, 2007- present Referee for journal publications including ICE and ASCE, 2006 - present Member of the editorial committee for the BDS Journal of Dams and Reservoirs. 2008 - present Member of the ASCE/EWVRI task committee on dam / levee break fluvial processes, 2008 - 2012 Languages Speaking               Reading                   Writing English                     Mother tongue           Mother tongue             Mother tongue French                     Good                   Good                       Reasonable IISmui F~rance                                           Page 1                                           's   2, Page E-3
Career Summary 2011 -present Director, Samui France SARL 2001 -2011 Principal Engineer, Floods Group, FIR Wallingford 1988 -2001 Graduate to Senior Engineer, Various Groups, HIR Walllngford 1987 -1988 Graduate Engineer, Potable Water Dept., Sir M MacDonald  
 
& Partners, Cambridge Education and Professional Status PhD Breaching of earth embankments and dams. The Open University, 2012 BEng Hons (1 st Class) in Engineering Science (Civil), Exeter University, 1987 Member of the Institution of Civil Engineers, 1993 Member of the Chartered Institution of Water and Environmental Management, 1993 Member of the British Dam Society Committee.
nra,[l@ll, *.;aInI  1*~lllt      eIguluglwl2-..l   - .V.lleIA. Im.... .... t::                   .............. Riie~'-
1999-2001, 2001-2005.
AnAnnRlxl  I Mark W Morris Current Practice Mark Morris is Director of Samui France sari, an independent consultancy established in France (Haute Savole) focussing upon specialist research and consultancy supporting management of the environment, with a particular focus upon water. The corc areas of work include specialist consultancy relating to reservoir safety, dam and levee performance (breach), and flood risk analysis and management.
2005-2011 Member of the Reservoir Safety Advisory, Group, 2007- present Referee for journal publications including ICE and ASCE, 2006 -present Member of the editorial committee for the BDS Journal of Dams and Reservoirs.
In parallel, Mark collaborates extensively on European research projects, undertaking technical roles, project coordination and project communication and dissemination activities. Samui France, in conjunction with its sister company in the UK (Samui Design) develops web based tools and systems to support collaborative working and technical project communication and dissemination.
2008 -present Member of the ASCE/EWVRI task committee on dam / levee break fluvial processes, 2008 -2012 Languages Speaking Reading Writing English Mother tongue Mother tongue Mother tongue French Good Good Reasonable IISmui F~rance Page 1 's 2, Page E-3 nra,[l@ll, eIguluglwl2-..l  
During 23 years of working at HR Wallingf'ord, Mark developed world leading expertise in dam and levee breach analyses, leading to the development of the HIR BREACH model, and supporting the more recent AREBA and EMBREA models. EMBREA arose from Mark's recent PhD) studies in'to breach modelling. Mark WaS deputy coordinator of the European FLOODsite project, which supported implementation of the European Floods Directive. Within this project Mark also managed technical work on flood defence failure modes, and levee breach, much of which now underpins the fragility curves used to drive the UK Environment Agency system risk models. Mark also managed the FRMRCII work package relating to rapid breach-model development (AREBA).
-.V.lleIA.
Selected Dam and Levee Projects 2009 - 201!3     EUROPEAN FLOODPROBE. PROJECT European research investigating specific processes associated with urban flooding and levee performance. Specific research forievees includes the analysis of internal erosion processes, the performance of vegetation and the use of remote data for reliability analyses 2012             DAMBREAK ANALYSIS FOR THE WLOCLAWEK DAM (VISTULA RIVER, POLAND)
Im.... ....t:: ..............
Provision of expert advice to ARUP UK and ARUP Poland for the analysis of potential failure modes, breach and dambreak simulation for the Wloclawek Dam, River Vistula, Poland.
Riie~'-Mark W Morris AnAnnRlxl I Current Practice Mark Morris is Director of Samui France sari, an independent consultancy established in France (Haute Savole)focussing upon specialist research and consultancy supporting management of the environment, with a particular focus upon water. The corc areas of work include specialist consultancy relating to reservoir safety, dam and levee performance (breach), and flood risk analysis and management.
2011i- 2012       SMALL RESERVOIR RISK CATEGORISATION With risk based reservoir safety legislation being introduced in England and Wales this project, commissioned by Defra, provided guidance and a simple risk assessment methodology aimed at owners of small reservoirs such that they could assess the risks posed by their existing or planned small reservoirs and hence take steps to minimise those risks through design and / or operation.
In parallel, Mark collaborates extensively on European research projects, undertaking technical roles, project coordination and project communication and dissemination activities.
20!1 -2012       A GUIDE TO RISK ASSESSMENT OF RESERVOIRS Following the earlier seoping study, development of a framework- and recommended tiered approach for risk assessment for reservoirs in England and Wales. The project develops the methodology and produces industry guidance which builds upon the earlier Interim Guide and CIRIA Guide to risk assessment, including current international best practice.
Samui France, in conjunction with its sister company in the UK (Samui Design) develops web based tools and systems to support collaborative working and technical project communication and dissemination.
2009 - 2010       DAMBREAK ASSESSMENT AND EMERGENCY PLANNING FOR KIO KHlO MA DAM, THAILAND Provision of expert advice on dam failure, flood routing and mapping, flood impact analysis, risk assessment and emergency planning for the Thai Kio Kho Ma Dam.
During 23 years of working at HR Wallingf'ord, Mark developed world leading expertise in dam and levee breach analyses, leading to the development of the HIR BREACH model, and supporting the more recent AREBA and EMBREA models. EMBREA arose from Mark's recent PhD) studies in'to breach modelling.
2008 -201i1       FLOOD RISK MANAGEMENT RESEARCH CONSORTIUM- FRMRC2 Task leader within the Infrastructure work package, developing a simplified breach model for use within system risk / reliability modelling.
Mark WaS deputy coordinator of the European FLOODsite project, which supported implementation of the European Floods Directive.
2008 - 2011       INTERNATIONAL LEVEE MANUAL Member of the UK steering committee for the development of an International Levee Manual, providing detailed guidance on the design, construction, maintenance and operation of flood levees.
Within this project Mark also managed technical work on flood defence failure modes, and levee breach, much of which now underpins the fragility curves used to drive the UK Environment Agency system risk models. Mark also managed the FRMRCII work package relating to rapid breach-model development (AREBA).Selected Dam and Levee Projects 2009 -201!3 EUROPEAN FLOODPROBE.
1.Samul 1rancePae2IAiO4 Page E-4
PROJECT European research investigating specific processes associated with urban flooding and levee performance.
 
Specific research forievees includes the analysis of internal erosion processes, the performance of vegetation and the use of remote data for reliability analyses 2012 DAMBREAK ANALYSIS FOR THE WLOCLAWEK DAM (VISTULA RIVER, POLAND)Provision of expert advice to ARUP UK and ARUP Poland for the analysis of potential failure modes, breach and dambreak simulation for the Wloclawek Dam, River Vistula, Poland.2011i- 2012 SMALL RESERVOIR RISK CATEGORISATION With risk based reservoir safety legislation being introduced in England and Wales this project, commissioned by Defra, provided guidance and a simple risk assessment methodology aimed at owners of small reservoirs such that they could assess the risks posed by their existing or planned small reservoirs and hence take steps to minimise those risks through design and / or operation.
Mark W Morris                                                                                             Appn~ndix F
20!1 -2012 A GUIDE TO RISK ASSESSMENT OF RESERVOIRS Following the earlier seoping study, development of a framework-and recommended tiered approach for risk assessment for reservoirs in England and Wales. The project develops the methodology and produces industry guidance which builds upon the earlier Interim Guide and CIRIA Guide to risk assessment, including current international best practice.2009 -2010 DAMBREAK ASSESSMENT AND EMERGENCY PLANNING FOR KIO KHlO MA DAM, THAILAND Provision of expert advice on dam failure, flood routing and mapping, flood impact analysis, risk assessment and emergency planning for the Thai Kio Kho Ma Dam.2008 -201i1 FLOOD RISK MANAGEMENT RESEARCH CONSORTIUM-FRMRC2 Task leader within the Infrastructure work package, developing a simplified breach model for use within system risk / reliability modelling.
*2008             RESERVOIR TNUNDATION MAPP[NG (RIM) PILOT APPLICATION Trial application of the RIM methodology to selected dams, highlighting issues with the proposed methodology. Undertaken in partnership with Atkins.
2008 -2011 INTERNATIONAL LEVEE MANUAL Member of the UK steering committee for the development of an International Levee Manual, providing detailed guidance on the design, construction, maintenance and operation of flood levees.1. Samul 1rancePae2IAiO4 Page E-4 Mark W Morris Appn~ndix F*2008 RESERVOIR TNUNDATION MAPP[NG (RIM) PILOT APPLICATION Trial application of the RIM methodology to selected dams, highlighting issues with the proposed methodology.
2008             RESERVOIR INUNDATION MAPPING (RIM) METHODOLOGY Expert guidance offered on methodology development as part of the project Quality Review Team.
Undertaken in partnership with Atkins.2008 RESERVOIR INUNDATION MAPPING (RIM) METHODOLOGY Expert guidance offered on methodology development as part of the project Quality Review Team.2008 INTEGRATION OF THE HR BREACH MODEL AND THE INFOWORKS RS FLOW , MODEL\- The HIR BREACH predictive breach model was integrated into the InfoWorks RS flow modelling package providing the first truly integrated commercial breach and flow modelling package.2007 -2009 DAM SAFETY INTEREST GROUP BREACH MODELLING PROJECT Participation in this international R&D project aimed at reviewing, evaluating and developing a predictive breach model for industry use. Participation as developer of the HR. BREACH model and evaluator of models.2007-2008 DEVELOPING A STRATEGY AND PRIORITISED PROGRAMME FOR RESEARCH SUPPORTING UK RESERVOIR SAFETY To review existing programmes of research supporting reservoir safety, develop an appropriate short and long term research strategy for the UK and to provide a prioritised list of recommended actions. This project supports the research programme being established by the Environment Agency through the Reservoir Safety Advisory Group. The research also considers different modes and sources of funding to support the research.2006 -2009 MODELLING EMBANKMENT PERFORMANCE (HR BREACH MODEL)Second stage development of the HR BREACH model through detailed analysis of IMPACT project data and additional research via the FLOODsite project. This development project will enhance the accuracy and capabilities of the HIR BREACH model for use in predicting breach growth through embankment dams and flood defence embankments.
2008               INTEGRATION OF THE HR BREACH MODEL AND THE INFOWORKS RS FLOW
2004 -2009 EUROPEAN FLOODSITE pROJECT -TASK 4 (FAILURE MODES) AND TASK 6 (BREACH MODELLING)
                , MODEL
Task Leader for FLOODsite Tasks 4 and 6 investigating failure modes for flood defence structures and breach initiation and growth processes..
                \- The HIR BREACH predictive breach model was integrated into the InfoWorks RS flow modelling package providing the first truly integrated commercial breach and flow modelling package.
Outputs included a definitive collation of failure modes for use in reliability analysis, along with a state of the art review and development of predictive breach models.2004 -2009 EUROPEAN FLOQOSITE PROJECT -INTEGRATED FLOOD RISK ANALYSIS AND MANAGEMENT METHODOLOGIES Project Manager for the FLOODsite Project, for which HR Wallingford is the Co-ordinating organisation.
2007 -2009         DAM SAFETY INTEREST GROUP BREACH MODELLING PROJECT Participation in this international R&D project aimed at reviewing, evaluating and developing a predictive breach model for industry use. Participation as developer of the HR.BREACH model and evaluator of models.
FLOODsite is a European Commission Integrated Project under the Sixth Framework Research Pr'ogramme comprising an extensive programme of research and application aimed at developing, drawing together and implementing an integrated European methodology for flood risk analysis and management.
2007-2008         DEVELOPING A STRATEGY AND PRIORITISED PROGRAMME FOR RESEARCH SUPPORTING UK RESERVOIR SAFETY To review existing programmes of research supporting reservoir safety, develop an appropriate short and long term research strategy for the UK and to provide a prioritised list of recommended actions. This project supports the research programme being established by the Environment Agency through the Reservoir Safety Advisory Group. The research also considers different modes and sources of funding to support the research.
The project team comprises members from, some 36 organisations drawn from 15 different countries with a total project value, of ,-E14M.I ISmwui [r'8otC Page 3 I5 Apri 2OI4 Page E-5 Mark W Morris Apnli Selected 'Publications Morris, M.W. (2011) Breaching of earth embank~ments and dams. PhD thesis. The Open University.
2006 -2009         MODELLING EMBANKMENT PERFORMANCE (HR BREACH MODEL)
Morris, M.W., Hassan, M.A.A.M., WahI, T.L., Tejral, R.D.,Hanson, G.J. and Teimple, D.M. (2012)..Evaluation and development of physically based embankment breach models. FLOODrisk2012 conference, Rotterdam, Netherlands.
Second stage development of the HR BREACH model through detailed analysis of IMPACT project data and additional research via the FLOODsite project. This development project will enhance the accuracy and capabilities of the HIR BREACH model for use in predicting breach growth through embankment dams and flood defence embankments.
20-22" November, 201'2. .. ...Van Damme, M., Morris, M.W., Borthwick, A.G.L. and Hassan, M.A.A.M. (2012). Rapid embankment breach modeling.
2004 -2009       EUROPEAN FLOODSITE pROJECT                   - TASK 4 (FAILURE MODES) AND TASK 6 (BREACH MODELLING)
FLOODrisk2012 conference, Rotterdanm, Netherlands.
Task Leader for FLOODsite Tasks 4 and 6 investigating failure modes for flood defence structures and breach initiation and growth processes.. Outputs included a definitive collation of failure modes for use in reliability analysis, along with a state of the art review and development of predictive breach models.
20-22" November, 2012.Tounnent, R., Morris; M.W. and ROyet, P. (2012). Levee failures related to structure transitions:
2004 - 2009       EUROPEAN FLOQOSITE PROJECT                 -   INTEGRATED FLOOD RISK ANALYSIS AND MANAGEMENT METHODOLOGIES Project Manager for the FLOODsite Project, for which HR Wallingford is the Co-ordinating organisation. FLOODsite is a European Commission Integrated Project under the Sixth Framework Research Pr'ogramme comprising an extensive programme of research and application aimed at developing, drawing together and implementing an integrated European methodology for flood risk analysis and management. The project team comprises members from, some 36 organisations drawn from 15 different countries with a total project value, of
typology, levee performance evaluation and improvements.
                  ,-E14M.
FLOODrisk2012 conference, Rotterdam, Netherl~ands.
I ISmwui [r'8otC                                         Page 3                                             I5 Apri 2OI4 Page E-5
2 0-2 2 nd November, 2012.Morris, M.w., Hassan, M.A.A.M. andvan Damme, M. (.2012) 'Recent impro~vements in predicting breach through flood enmbankments and embankment dams'. British Dam Society ! Biennial Conference, University of Leeds. 1 2-1 5September, 2012."-Morris, M.W., Wallis, M., Brown, A.J., Bowles, D.S., Gosden, I, Hughes, A.K., Topple, A., Sayers, P.B. and Gardiner, K. (2012) 'Reservoir safety risk assessment  
 
-a new guide'. British Dam Society. 17lIh Biennial Conference,,University of Leeds., 12-i.5 September, 2012.Morris, MW.W, Goff, C. and Simm, J.D. (2012) "Current European research relevant to reservoir safety: the FloodProBE and UrbanFlood projects'.
Mark W Morris                                                                                         Apnli Selected 'Publications Morris, M.W. (2011) Breaching of earth embank~ments and dams. PhD thesis. The Open University.
British Dam Society 17"' Biennial University of Leeds. l2-15"' September, 2012.Samuels, P.O. and Morris, M.W. (20.102 'ldealised model for flow towards a dam breach', FirSt European DiiinIAHR Congress, Edinburgh.
Morris, M.W., Hassan, M.A.A.M., WahI, T.L., Tejral, R.D.,Hanson, G.J. and Teimple, D.M. (2012)..Evaluation and development of physically based embankment breach models. FLOODrisk2012 conference, Rotterdam, Netherlands. 20-22" November, 201'2.                                 ..   ...
4.6" May, 2010.Samuels, P.G., Morris, M.W., Sayers, P;B., Creutin, J.-D., Kortenhaus, A., Klijn, F., van Os, A., Mosselman, E.and Schanze, J. (2010) 'A framework for integrated flood ,risk* man agement', First European, Division iAHIR Congress, Edinburgh.
Van Damme, M., Morris, M.W., Borthwick, A.G.L. and Hassan, M.A.A.M. (2012). Rapid embankment breach modeling. FLOODrisk2012 conference, Rotterdanm, Netherlands. 20-22" November, 2012.
4-6lIh May, 2010. ..., ..Morris, M.W. and Hassan, M.A.A.M. (2009) 'Breach *modelling research into practice:
Tounnent, R., Morris; M.W. and ROyet, P. (2012). Levee failures related to structure transitions: typology, levee performance evaluation and improvements. FLOODrisk2012 conference, Rotterdam, Netherl~ands. 2 0 -22nd November, 2012.
ConclUsions from the HR Wallingford  
Morris, M.w., Hassan, M.A.A.M. andvan Damme, M. (.2012) 'Recent impro~vements in predicting breach through flood enmbankments and embankment dams'. British Dam Society ! 7t* Biennial Conference, University of Leeds. 12 -15 *' September, 2012."-
& European FLOODsiteProjeets', ASDSO Dam Safety 09, Hollywood, Florida, US2009.Tagg, A.F., Morris, M.W., Lumbroso, D.M. and Di Mauro, M. (2009) 'Improved .Emergency Planning and Evacuation through the use ofra Loss of Life Model', A SDSO Dam Safety 09, Hollywood, Florida, US, Simm, J.D., Morris, M.W., Gouldby, B.P.. and Sayers, P.B. (2009) 'Levee fragility and breach growth analysis', ASFPM Conference 2009, Orlando, Florida, US, Morris, M.W., Hassan, M.A.A.M., Ghataora, 0.5. and-Samuels, P.O. (2009) 'Breach formation:
Morris, M.W., Wallis, M., Brown, A.J., Bowles, D.S., Gosden, I, Hughes, A.K., Topple, A., Sayers, P.B. and Gardiner, K. (2012) 'Reservoir safety risk assessment       -   a new guide'. British Dam Society. 17lIh Biennial Conference,,University of Leeds., 12-i.5 September, 2012.
Identifying~key physical processes to support improved breach numerical modelling', 33rd IAHIR Congress, Vancouver, British Colombia, Morris, M.W., Hanson, 0.1. and Hassan, M.A.A.M. (2008) 'Improving the accuracy.
Morris, MW.W, Goff, C. and Simm, J.D. (2012) "Current European research relevant to reservoir safety: the FloodProBE and UrbanFlood projects'. British Dam Society 17"' Biennial *Conference, University of Leeds. l2-15"' September, 2012.
of breach' modelling:
Samuels, P.O. and Morris, M.W. (20.102 'ldealised model for flow towards a dam breach', FirSt European DiiinIAHR Congress, Edinburgh. 4.6" May, 2010.
why are-we not progressing faster?' Journal of Flood Risk Management, Vol. 1 (No. 4), pp. pp. 150-161.Morris, M.W. (2008) 'IThe impact of dambrealc  
Samuels, P.G., Morris, M.W., Sayers, P;B., Creutin, J.-D., Kortenhaus, A., Klijn, F., van Os, A., Mosselman, E.
-managing risks', Dam Safety'Management 2008, Nanjing, China, 22-24th October, 2008.Morris, M.W., Hassan, M.A.A.M, Kortenhaus, A., Geisenhainer, R, Visser, Pi. and Zhu, Y. (2008). Modelling breach initiation and growth. FLOODrisk 2008 conference, September-2" October, 2008. Oxfiord, UK Morris, M.W., Hughes, A.J. and Buiijs, F (2008). Dambreak and emergency planning:
and Schanze, J. (2010) 'A framework for integrated flood ,risk* management', First European, Division iAHIR Congress, Edinburgh. 4-6lIh May, 2010.                 .         ..,   ..
Meeting end user needs.British Dam Society 15"' Biennial Conference, Warwick, Sept 2008.Morr'is, M.W., Hassan, M.A.A.M., Samuels, P.G. and'Ghataora, G.S. (2008). Development of the HR BREACH model for predicting breach growth through flood embankments and embankmhent dam~s. Piverflow2008 International conference on fluvial hydraulics, 3-5"' September, 2008. lzmir, Turkey.Morris, M.W.,,Hassan, M.A.AM., Buchholzer, Y. and Davies, T. (2008). HR BREACH: Developing a practical breach model to meet industry needs. us Society on Danm.s 28"' Annual Meeting and Conference, April 28"' -May 2"d, Portland, Oregon.Mor'iis, M.W., Hassan, M.A.A.M and Vaskinn, K.A., (2007). Breach forrmation:
Morris, M.W. and Hassan, M.A.A.M. (2009) 'Breach *modelling research into practice: ConclUsions from the HR Wallingford & European FLOODsiteProjeets', ASDSO Dam Safety 09, Hollywood, Florida, US2009.
Field tests and laboratory experiments.
Tagg, A.F., Morris, M.W., Lumbroso, D.M. and Di Mauro, M. (2009) 'Improved .Emergency Planning and Evacuation through the use ofra Loss of Life Model', A SDSO Dam Safety 09, Hollywood, Florida, US, Simm, J.D., Morris, M.W., Gouldby, B.P.. and Sayers, P.B. (2009) 'Levee fragility and breach growth analysis',
Journal of Hydranlic Research, Volume 45, Extra Issue (2007).II frange Page 4 15' Page E-6}}
ASFPM Conference 2009, Orlando, Florida, US, Morris, M.W., Hassan, M.A.A.M., Ghataora, 0.5. and-Samuels, P.O. (2009) 'Breach formation: Identifying~key physical processes to support improved breach numerical modelling', 33rd IAHIR Congress, Vancouver, British
: Colombia, Morris, M.W., Hanson, 0.1. and Hassan, M.A.A.M. (2008) 'Improving the accuracy. of breach' modelling: why are-we not progressing faster?' Journalof FloodRisk Management, Vol. 1 (No. 4), pp. pp. 150-161.
Morris, M.W. (2008) 'IThe impact of dambrealc     - managing the* risks', Dam Safety'Management 2008, Nanjing, China, 22-24th October, 2008.
Morris, M.W., Hassan, M.A.A.M, Kortenhaus, A., Geisenhainer, R, Visser, Pi. and Zhu, Y. (2008). Modelling breach initiation and growth. FLOODrisk 2008 conference, 30*? September- 2" October, 2008. Oxfiord, UK Morris, M.W., Hughes, A.J. and Buiijs, F (2008). Dambreak and emergency planning: Meeting end user needs.
British Dam Society 15"' Biennial Conference, Warwick, Sept 2008.
Morr'is, M.W., Hassan, M.A.A.M., Samuels, P.G. and'Ghataora, G.S. (2008). Development of the HR BREACH model for predicting breach growth through flood embankments and embankmhent dam~s. Piverflow2008 International conference on fluvial hydraulics, 3-5"' September, 2008. lzmir, Turkey.
Morris, M.W.,,Hassan, M.A.AM., Buchholzer, Y. and Davies, T. (2008). HR BREACH: Developing a practical breach model to meet industry needs. us Society on Danm.s 28"' Annual Meeting and Conference, April 28"' -
May 2 "d, Portland, Oregon.
Mor'iis, M.W., Hassan, M.A.A.M and Vaskinn, K.A., (2007). Breach forrmation: Field tests and laboratory experiments. Journal of Hydranlic Research, Volume 45, Extra Issue (2007).
II *amui frange                                         Page   4                                         15'Ar*0O)h Page E-6}}

Latest revision as of 23:15, 4 February 2020

Validation of Hrr Breach Hydrograph for Jocassee Dam, Dated April 30, 2014 (Redacted)
ML16272A216
Person / Time
Site: Oconee  Duke Energy icon.png
Issue date: 04/30/2014
From: Ehasz J
URS Corp
To:
Office of Nuclear Reactor Regulation
Shared Package
ML16070A295 List:
References
FOIA/PA-2016-0071
Download: ML16272A216 (146)


Text

Enclosure I

  • lthkkh.Id ,fr,,m i,lkl. 'sjIjl,*iru, 'n*Iv 4( .*ID0",QIrl ML14139A175 Enclosure 1 Validation of HRR Breach Hydrograph for Jocassee Dam by Joseph L. Ehasz, P.E. and Dr. David S., Bowles, P.E.,

April 2014

Wg

~~~~~~1~~

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM (Through an In-Depth Review of the Xu and Z[hang Breach Parameter Estimation Methodology)

April 2014 By Joseph 1. Ehasz, P.E.

Dr. David S. Bowles, P.E.

-. A ------------- TL1--------

"Jr" ............. DAMt*J FOR JOCASSEE l*AL(

URS Inassodiation with VALIDATION OF HRR BREACH HYDROGRAPH VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM A

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM (THROUGH AN IN-DEPTH REVIEW OF THE XU AND ZHANG BREACH PARAMETER ESTIMATION METHODOLOGY)

APRIL 2014 BY APRIL 30, 2014 JOSEPH L. EHASZ, P.E.

URS CIVIL CONSTRUCTION & MINING, INC.

DR. DAVID.S. BOWLES, P.E.

RAC ENGINEERS AND ECONOMISTS, LLC 30,A201 APRIL PAGE I

i,uynapgp* oerurn~y .*n:*iuve ,nrormuuon -wIUmnoIU rrom puo~uC asciosure per 1u L1-I 2,390(c1)

VALIDATION OF HRR BREACH H VDROGRAPH FOR JOCASSEE DAM TABLE OF CONTENTS SECTION PAGE 1.0 OBJECTIVE..................................................................................................... 1 1.1 Authorization .................................................................................................. 1 1.2 Objective of the Validation Report............................................................................ 1

2.0 INTRODUCTION

................................................................................................ 2 2.1 HRR (Duke 2013) Breach Hydrograph ....................................................................... 2 2.2 Agency Questions ............................................................................................ 3 2.3 Summary of Approach for This Review ...................................................................... 4 2.4 Report Ouline ................................................................................................ 5

3.0 BACKGROUND

................................................................................................. 7 3.1 Characterization of Jocassee Dam ........................................................................... 7 3.2 Piping Failure Mechanism .................................................................................... 9 3.3 Potential Piping Failure Modes for Jocassee Dam.......................................................... 10 4.0 CONFIRMATION OF JOCASSEE DAM ERODIBILITY....................................................... 11 4.1 Overview..................................................................................................... 11 4.2 Use of Briaud's Erosion Categorization Scheme by Xu and Zhang (2009)................................. 11 4.3 Confirmation of Low Erosion Category for Jocassee Dam.................................................. 13 5.0 ORIGINAL XU AND ZHANG REGRESSION EQUAlIONS................................................... 15 6.0 REVIEW AND REVISION OF XU AND ZHANG REGRESSION EQUATIONS............................... 16 6.1 Approach to Review and Revision .......................................................................... 16 6.2 Summary of Review Findings................................................................................ 17 6.3 Summary of Revisions to Case History Data Set........................................................... 24 6.4 Revised Regression Equations for use inthe Sensitivity Study ......................................... ,.,.26 6.5 Application to Teton Dam Failure ........................................................................... 28 1.0 REVISED XU AND ZHANG REGRESSION EQUATIONS SENSITIVITY STUDIES ......................... 32 7.1 Overview of Approach....................................................................................... 32 7.2 Revised Xu and Zhang Breach Parameter Estimates for Jocassee Dam .................................. 32 7.3 Example of Inconsistencies between Peak Breach Flow and Breach Development Time ................. 40 7.4 Discussion of HEC-RAS Results..... ....................................................................... 41

8.0 CONCLUSION

S ............................................................................................... 45 8.1 Discuss Overall Conclusion ................................................................................. 45 8.2 Concluding Responses to Agency Questions............................................................... 45 8.3 Concluding Support for the HRR Breach Hydrograph ...................................................... 46

9.0 REFERENCES

................................................................................................. 50 PA GE ii

s.,onrans *ecurnzy *enssuve minrirwuun ';*i#~ [lEE pua; uo ,uou  ;*,

r x I.r3 83, VALIDA TION OF HRR BREACH HYDROGRAPH FOR JOCASSEE, DAM

. p

_APPENDICES Appendix A- Briaud's Report Appendix B- Original Xu and Zhang Regression Equations and HRR Hydrograph.

Appendix C- Bench Marking / Comparative Analysis 0.1 - Benchmarking Rockfill Dams and Failures 0.2- Embankment Design Appendix D- Detailed Data Supporting Xu and Zhang Revisions Appendix E- Mark Morris Review Report P A GE iii

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 1.0 OBJECTIVE 1.1 Authorization The authorization for this review was attached in an e-mail dated June 20, 2013 from Mr. Dean Hubbard, Duke Energy, to Mr. Joseph Ehasz, URS, Civil Construction & Mining 1.2 Objective of the Validation Report The objective of this report is to respond to questions raised by the FERC and the NRC about the use of the Xu and Zhang (2009) regression equations for estimating breach parameters to develop the breach hydrograph for a deterministic sunny-day breach of the Jocassee Dam. The agency questions are presented in Section 2.2. The implications of these responses and a detailed review of the Xu and Zhang (2009) methodology provide support for the breach hydrograph submitted to the NR C by Duke (2013) in the Hydrologic Reevaluation Report (HRR).

PAGE 1

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM

2.0 INTRODUCTION

2.1 HRR (Duke 2013) Breach Hydrograph The HRR breach hydrographs (DUKe 2013) for a deterministic :sunny-day breach of the Jocassee Dam were developed as follows:

  • The predicted median breach dimensions obtained from the Xu and Zhang (2009) best exact regression equations for a low erosion category were input to the HEC-RAS model.
  • The values of the orifice and weir"coefficients and the breach progression relationship in HEC-RAS were iteratively changed within reasonable ranges of values to match the predicted peak breach flow rate and the failure time from Xu and Zhang (2009).

Consistent with the definition of failure time by Xu and Zhang (2009), the predicted value of failure time was used in HEC-RAS as a combination of breach initiation and breach formation.

An independent review, entitled "Jocassee and Keowee Dams Breach Parameter Review",

dated February 2013, was performed on the Jocassee Dam postulated breach parameter estimates and underlying assumptions by Joseph L. Ehasz and Dr. David S. Bowles (Ehasz and Bowles 2013). That review focused on the appropriateness of estimating potenti~al piping breach parameters for the Jocassee Dam based on the rXu and Zhang (2009) regression equations. Duke Energy and its consultant HDR Engineering had selected the dam breach parameter estimation methodology proposed by Y. Xu and L. M. Zhang in their technical paper entitled "Breaching Parameters for Earth and Rockfill Dams" published in the American Society of Civil Engineers (ASCE) Journal of Geotechnical and Geoenvironmental Engineering in December 2009 and in Xu (2010). This is a "state of knowledge" paper and is specifically applicable for consideration of a piping breach in a zoned embankment dam. The .main objective of the paper is to develop robUst empirical formulas for estimating dam breach' parameters that consider ph~ysical characteristics of the dam such as the erodibility of the embankment materials in addition to the dam height and reservoir volume, which most other regression methods rely on.

The physical features of embankment dam design and construction Strongly influence both the.

likelihood of a piping dam breach occurring and the breach characteristics in the event that a breach occurs. Therefore, our February 2013 report (Ehasz and Bowles 2013) began with a summary of some important physical features of the Jocassee Dam. It continued with an evaluation of, if piping should initiate, would detection. and Successful intervention be likely to prevent a failure. It discussed what piping failure modes might apply to Jocassee Dam based on a potential failure modes analysis and some general breach parameter *considerations.

PAGE 2

~J S In association with lAhC

  • ,*e.=*u* VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Finally, it evaluated, using the "state of knowledge," what are the appropriate breach param eters for Jocassee Dam? Those parameters were then used by HDR to simulate the downstream conditions that mi;ght result from a breach of Jocassee Dam caused by a piping failure.

The basis of the breach parameters that were used to represent the Jocassee Dam for a piping breach and the resulting breach hydrograph were developed based on the breach parameter estimation methodology developed by Xu and Zhang (2009). Significant factors in selecting the Xu and Zhang (2009) methodology 'included its distinction between modes of failure, namely either overtopping or piping, and its consideration of the erodibility of the embankment materials. In fact, erodibility was found to be the most significant control variable in the Xu and Zhang (2009) regression equations for all five breach parameters.

The conclusions from our February 2013 (Ehasz and Bowles 2013) review of 'the basiS for the HRR breach hydrograph (Duke 201.3) are sum marized as follows:

,Xu and Zhang (2009) is considered to be a "state-of-the~practice" regression method for estimating .piping dam breach parameters. Unlike most other methods,, it includes erodibiiity as .a control variable. This. variable was found to be the most .important variable in. the Xu and Zhang (2009) regression analysis. The capability to consider erodibility is particularly important for predicting breach parameters for Jocassee Dam to account for the influence of its modern dense rockfill construction.

  • The HRR (Duke 2013) breach hydrograph is .a realistic but conservative breach hydrograph that, has good defendablity based on the validity of the Xu and Zhanig (2009) method and the conservative nature of the median br~each parameter estimates due to:

o uni-directional breach formation due a postulated piping failure mode initiating in the Ib()*

o the deposition of eroded rockflll immediately below the dam leading to a tailwater rise that would limit the rate of breach development: and o the robust characteristics of a modern zoned central core rockfill dam that were included in the design and construction of Jocassee Dam that make it more erosion resistant than other low erodibility dams in the Xu and Zhang (2009) case histories data set on which their regression analysis is based.

2.2 Agency Questions

'PresentationS of the estimated Jocassee Dam breach parameters and simulated downstream conditions were made to both the FERC and the NRC based on the review presented in our February 2013 report (Ehasz and Bowles 2013). In ,addition,. a field trip was made to the Jocassee Dam site by representatives of both regulatory agencies to visually inspect, the condition of the dam as-well as the monitoring procedures .and resulting observations.

PAGE 3


U-,

BpVlll 5-------

J*P*ImV *eVVeV*IV rIFVl #V J VAUDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Both the FERC and the NRC had questions about the use of the Xu and Zhang (2009) methodology fordeveloping the breach parameter estimates. These questions are summarized as follows:

1) Precedence - where has use of the Xu and Zha ng (2009) methodology been accepted?
2) Chinese case histories - about 43% of the dam failure case histories on which the Xu and Zhang (2009) methodology is based are *for Chinese dams for which little information is available in the US.
3) Representation of icase histories for rockfill and other low erodibility dams - the data set of dams used by Xu and Zhang (2009) to develop ,the regression equations has only three dams that are considered large (iLe. > 15 meters high) embankment dams with low erodibility and these darms are all outside of the US.,
4) Use of the Briaud erosion categories - how were the erosion categories developed by Briaud (2008) applied in develOping the Xu and Zhang (2009) methodology and are they applicable to dam breach?
5) Breach time definition 1 - the definition of time to failure used by XU and Zhang (2009) includes at least part of the breach initiation phase in addition to the breach formation process unlike other regression methods that include only the breach formation process.

Therefore the objective of this report is to respond to these agency questions and to provide support for the appropriate use of the Xu and Zhang (2009) methodology for Jocassee Dam in developing the HRR breach hydrograph submitted to the NRC by Duke. (201 3).

2.3 Summary of Approach for This Review The- major activities conducted under this review were as follows:

  • A four-day working session was held with Dr. Yao Xur, the principal author of the Xu and Zhang (2009) methodology. Professor Jean-Louis Briaud, the author of the erosion categorization methodology used by Xu and Zhang (2009) participated in the first two days. Dr. Xu responded to the agencY questions, and participated in a detailed case-by-case review of the 75 case histories that were used to develop the Xu and Zhang (20,09) regression equations.
  • Professor Briaud made a site visit to Jocassee Dam to become familiar with the properties of the rockfill materialr and other aspects of its cOnstruction. He addressed questions ,regarding the appropriateness of using his erosion categorization methodology in the Xu and Zhang (2009) breach parameter methodology. He also confirmed the low erosion category for Jocassee Dam.

'-in this report-the terms breach development time, and breachformation time are used interchangeably.

PAGE 4

IJSIn association with **

VALIDATION OF HRR BRF.ACH HYDROGRAPH FOR JOCA SSEE DAM p

Revised regression equations were developed by Dr. Xu for sensitivity studies on the Jocassee Dam HRR breach hydrograph based on changes that were made to the original Xu and Zhang (2009) case histories data set to address the agency questions and some other issues identified during our detailed review. The revised equations were also applied to Teton Dam to compare with the observed breach parameters and those obtained by Xu and Zhang (2009) an d the observed breach parameters.

  • Sensitivity studies were conducted based on the revised Xu and Zhang and the Froehlich (1995a and 2008) regression equations applied to Jocassee Dam. The resulting breach parameter estimates were used by HDR in the HEC-RAS model to obtain breach hydrographs .for a deterministic sunny-day breach of the Jocassee Dam.

A comparison of these hydrographs with the HRR breach hydrograph submitted to the NRC by Duke (2013) provided support for the HRR breach hydrograph.

2.4 Report Outline

  • Section 3 of this rePOrt contains an update of the background discussion of Jocassee Dam that was provided in our February 2013 report (Ehasz and Bowles 2013).
  • Section 4 presents the outcomes of Professor Briaud's visit to Jocassee Dam his confirmation of the low erosion category for the rockfill material for this dam.
  • Section 5 refers to a summary of the original Xu and Zhang. (2009) methodology and its original implementation for Jocassee Dam contained in Appendix B.
  • Section 6 presents the findings of the review of the original Xu and Zhang (2009) methodology that we conducted with Dr. Xu, including the changes made to the case histories data set to address the FERC and NRC questions and the development of revised regression equations.
  • Section 7 presents the sensitivity study using the revised regression equations for Jocassee Dam, which .prOvides support for the breach hydrographs submitted in the Hydrologic Reevaluation Report (HRR) to the NRC by Duke on March, 12, 201i3 (Duke 2013).
  • Section 8 presents the overall conclusions and responds to the questions presented by the FERO and NRC.
  • Appendix A contains Professor Briaud's complete report.
  • Appendix B. summarizes the original Xu and Zhang (2009) methOdology and its original implementation for Jocassee Dam on which the HRR hydrograph (Duke 2013) is based.
  • Appendix C contains a bench marking/comparative analysis for rockfiUl dams and characteristics of recent failures relative to Jocass ee Dam.
  • Appendix D contains the detailed data supporting the revision to the Xu and Zhang regression equations.

PAGE 5

TI "RInassociation with l*4~ C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Appendix E contains a review of this report ,by Dr. Mark Morris, an internationally recognized European expert in dam breach analysis and breach hydrograph development.

The most significant outcome and conclusions of this report are the verification and revision of the data set utilized to develop the breach parameter regression equations presented in the Xu and Zhang (2009) and the verification of the interpretation of the erosion characteristics on which the Xu and Zhang (2009) methodology is based. Through sensitivity analyses based on the revised Xu and Zhang regression equations and the Froehlich (1995a and 2008) regression equations it is demonstrated that the HRR .breach hydrograph (Duke.2013) for a deterministic sunny-day piping breach of the Jocassee Dam is a reasonable and contservative estimate.

PAGE 6,

~1MIENprn ~in.A5I 58W ~mIW85VW 5155121 UIIEII.MI - WWIIRIINU.MI.Z 11(2115 £51R82158. LumqU3ala, W 5(2 I..r~ £..I~m CII

....... dV .............................. r* ............... ir* ............. i,,.-7 VAUDA 170ff Of HRR BREACH HYRGRP FOR JOCASSEE DAM

3.0 BACKGROUND

Our February 2013 (Ehasz and Bowles 2013) report gave some details of the Jocassee Dam embankment, the general piping failure mechanism and the potential piping failure modes for the dam. As background and for continuity, this report will repeat some of this information in this section, especially with regard to the characterization of the dam and it's attributes as they affect erodibility during development of a postulated breach.

3.1 Characterization of Jocassee Dam The following statements describe the detailed characteristics of the dam and are significant to dam performance and breach characteristics (see Figures 3.1 and 3.2):

  • The dam was completed in 1967. It has been continuously monitored and has performed very well to the present; meeting or exceeding FERO standards. Even though the dam was designed and constructed in the mld-1960's it has all the modem and defensive measures of the rockfill dams designed and constructed today. A detailed review of the Jocassee Dam and it's performance was conducted 20 years after completio as described in the report entitled, "Jocassee Main Dam Design, Construction and Performance", by George F. Sowers, April 1987.

Figure 3.1. Google aerial view of Jocassee Dam PAGE 7

. .... .f.. ff -- 7rE

. .. .. i'L .. . . . . . . 1 F j E'S Q.% .1-,

In association with R .ILC VALIDATION OF HRR BREACH H'YDROGRAPH FOR JOCA$$EE DAM U

(b)(7)(F)

~~JOCASf.;E PAM CRO*; s~cri0N Figure 3.2. Jocassee Dam cross section (Sowers 1987)

Security sensitive Information. Withhold from public disclosure under 10 CFR 2.390 (d)( 1)

Beginning at the rock foundation levelI,(b)(l)F) I (b)(7)(F)v ri To decrease the hydraulic *radients as low as possible (b)(7)(F) 0

,oUv*t-foundation contact. lalong the To protect the core materials from internal erosion, material movement and potential piping of the core, I(b)(7)(F)

(b)(7)(F) linto the larger rockfill materials.

v PAGE PAGES 8.

I':z.. *.sz.. -. :..:..*u#....:u.. - -- ;iI.2 ll~l .. .Sm.l UUUzaIL*r.

Ua,.~pgjLajr-i z*

Uaw

  • .! a U L-r" -

-- *I KJDgS Insocaonwt1A C

  • VALIDATION OF HRR BREACH HYVDROGRA PH FOR JOCASSEE DAM Quality Control: selection of materials and documentation was enforced by the Resident Engineering staff and maintained as an. important function during .the construction.' As indicated above, the selection and placement of the various Zones was carefully done so as 'to maintain 'the' compatibility'of adjacent materials-to eliminate migration of materials and maintain a stable embankment. Grain-size and density testing .to verify selection of soil. and rockfill materials properties and' compaction were condUcted .at intervals tO confirm and maintain control of the placements. Field inspection was maintained during construction with Duke Engineering staff observing and. interfacing to ensure the design*

intent was maintained throughout construction.

All Of the above facts are important when considering the potential for internal erosion and piping at Jocassee Dam. The materials and features employed during design and construction,.

as described above, were all-designed to minimize the possibility of piping .and .failure of the embankment. Thus, it is even difficult to .envision the development of a piping condition .at the Jocassee Dam, given the defensive design measures incorporated and with the past 45 years of excellent performance. However, a deterministic approach is being .used to postulate a sunny-day piping failure for Jocassee Dam, Many of the above-listed facts .also affect the. breaching, characteristics Under the hypothesis that. a .piping failure occurs. Ideally these favorable physical properties would be taken into consideration in estimating breach parameters. Unfortunately regression methods for estimating breach parameters are .somewhat limited .in the. degree ,to which this can be done.

An exception is the Xu and Zhang (2009) methodology in which erodibility is considered.

3.2 Piping Failure Mechanism For piping to occur, all four of the following Conditions, must exist:

1) there must be a source of water and a flow path;
2) there must be an unprotected exit for the eroded material;
3) there must be. erodible, material in the flow path'; and
4) the material must .support a roof for a pipe to enlarge and .propagate.

The piping phenomenon must originate with internal erosion and material movement' somewhere within the dam or its foundation, such .as at the abutment-core contact, and exit downstream. The flow of water and materials must have an exit, to which the flow can carry matedials and then progress upstream along some erosion path. and move mat~erials from luPAGE 9

I.n ~ wrny, .O~aev ,, Ir, ,u u  ;;-, vv;ui,. i ,-, 'pu,Ij... ......... 93 .-

KIR Inassociation wath~l*.*CZ

' '* VAL.IDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM*

upstream. With 'increasing movement of large amounts of water carrying materials, the flow

.would eventually form a flow path within the downstream rockfili portiOn of'the dam, referred to as a "pe". If the process, called the "breach initiation phase", continues and the flows increase, it would .progressively engage a larger and larger portion of the rockfill and eventually form a raveling Condition within the rockfillt large enough to make the downstream shell of the dam unstable. If it becomes unstable enough to move. rockfill downstream *or to cause pockets through Collapses, it could then expose the core, which is the water retaining structure of the dam for the upstream reservoir. If support is removed from the downstream side of the core, it would become unstable and partially collapse. The breach of the dam would progress as it overtops the core and form an overtopping breach and failure of the dam; this is Considered the>

Start of the "breach formation phase".

The defensive measures within the Jocassee Dam are designed, constructed and incorporated, with consideration of all four of the necessary conditions for piping, to minimize any potential for the piping process to occur.

3.3 Potential Piping Failure Modes for Jocassee Darn In a Potential Failure Modes Analysis (PFMA), which was facilitated by RAC Engineers &

Economists and' included engineers from.Duke Hydro and HDR,. th*a mn-t Iik.lv (i* "lg*

unlikely") pipingl failure mode was determined tobe' piping;th..rougn'*t** I (I()()PiPing through the rock foundation of the main dam is considered

  • to be a Significantly less lkely piing failure mode due to the tight rock formations and low seepage rates in the I~b()(F) j The po~tential for piping through the main dam embankment is extremely Unlikely for the reasons described in our February 20*13 report (Ehasz and Bowles 2013). Each of these failure modes is described in detail in Appendix A of our February 2013 report (Ehasz and Bowles 2013).

P A 6 e-lO

    • l*ElE*iJr*_ *l*_l*_l#rm31f
  • Jr3*miivl.* 4fI#f] *mmf*Ifl m WWlIfmfaEJIEJ #EEJIWl IJE3EJil* EJI.*BE 8EJ.%Jm#e.* zm*m J* L s*#Emallm VALIDATION OF HRR BREACH H YDROGRAPH FORJOCASSEE DAM 4.0 CONFIRMATION OF JOCASSEE DAM ERODIBILITY 4.1 Overview Dam erodibility is described by Xu and Zhang (2009) as a relative measure based on the embankment material compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information. In their regression analysis, Xu and Zhang (2009) found dam erodibility to be the most important control Variable for predicting all five breach parameters. The three erosion categories (Jow, medium or high) used in the Xu and Zhang (2009) equationS referenced the technical lecture paper by Briaud (2008), whereby soils and rocks are classified into various erosion resistance categories based on water velocity or hydraulic shear stress at the soil-water interface (see Figures 4.1 a and 4b).

Therefore it is significant to establish the compatibility of Xu and Zhang's application of the Bdiaud erosion categories with the categorization, system developed by Briaud (2008).

To directly address the erodibility questions and to develop a clear explanation of the three erosion categories (low, medium and high) used by Xu and Zhang (2009) and the six erosion categories (non-erosive, very low, low, medium, high and very high) developed by Briaud (2008), Professor Briaud made a site visit to the JoCassee Dam and participated in a face-to-face meeting with Dr. Yao Xu in Denver. A summary of the Professor Briaud's responses to several questions about the use of his erosion categorization Scheme by Xu and Zhang (2009) is provided in Section 4.2. A summary of Professor Briaud's independent evaluation of the erosion category for Jocassee Dam is contained in Section 4.3. Professor Briaud's complete report is contained in Appendix A.

4.2 Use of Briaud's Erosion Categorization Scheme by Xu and Zhang (2009)

The site meeting with Professor Briaud took place on October 3rd and 4 th 2013 at the Jocassee Dam site in South Carolina and at the offices of Duke Energy at the Oconee Nuclear Plant. The purpose of the site visit was for Professor Briaud to become familiar with the Jocassee Dam and the materials used for construction. In addition, he was asked if his erosion categories are applicable to erosion during an earth dam breach and specifically:

  • Is your (Briaud) work applicable to earth dam erosion?
  • What is your (Briaud) characterization of Jocassee Dam erosion characteristics?
  • Please comment on Xu and Zhang work on dam breach, and how 'the three erodibility classifications, used by Xu and Zhang, compare to your six classifications.

P AG E..11

VAUO.ITJON OF: HRR BREATH HYDROGRAPH FOR JOCASSEE DAM DA%4 urn+

EROSION RATE ISS, 0.I, IlI.. 1O IU V1ELOCITY (rn/a)

Figure 4.1a. Overall erosion category for Jocassee and Toton Damns (velocity based )

iDfl ti J()f +%%tIF 0660 II16 r II I I, lION EROSION RATE IN -

(mm/br)

VwL.u Koch O.'

S I I.I Ili, 1i1111 Iew 101ms SHEA.+R STRES.*PS (Pu)

Figure 4.lb. Overall erosion category for Jocanssee and Tetan Dams (shear stress based)

Professor Briaud prepared a detailed report on his site visit to Jocassee Dam (Briaud 2013) and his answers to the above questions (see Appendix A). A summary of his responses is as follows:

  • Is your (Briaud) work applicable to earth dam erosion? The erosion function is characterizing the behavior of the soil at the element level so it is broadly applicable to many erosion siutos, including the erosion and breach process for earth and rockfili embankment dams. The erosion function is the curve which links the erosion rate to the water velocity or the hydraulic shear stress at the sol-water interface; it is to erosion studies what the stress strain curve is to deformation problems. It is a consiutv equation, which can be used in numerical methods as easily as in simple hand calculations.

P AG e 12

  • ' VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM
  • What is your (Briaud) characterization of Jocassee Dam erosion characteristics? The erodibility of the Jocassee Dam materials was. evaluated; and the Jocassee Cross-section materials are clearly and conservatively established to be "low erodibility" materials (see Section 4.3).
  • Please comment on Xu and Zhang work on dam breach, and how the three erodibility classifications, used, by Xu and Zhang, compare to your six classifications. The XU and Zhang regression equations do show and consider that erodibility is the most significant factor in the development of embankment breach parameters. Thus, it is most important, in my evaluation of their"equations, that I have found that Xu and Zhang have assigned tlhe "low, medium or high" erodibility categories in a way that is consistent with my research findings for the variousdams represented by the data Used to establish their regression equations. The categorization reflects the fact that the types of materials typically used for the construction of earth dams fall into the Briaud erosion categories 2, 3, and 4 with some Category 5 materials for rockfill dams. Indeed fine sands and non-plastic silts (Briaud category 1) .and jointed and intact rock (Briaud category 6) are not Used in earth da m engineering.

4.3 Confirmation of Low Erosion Category for Jocassee Dam To evaluate the erosion category for the Jocassee Dam, the following process. was Used by Professor Briaud:

  • A cross section of the dam was drawn, see Figure 4.2.
  • An erosion category was chosen for each material within thedam based on the specified values of the median particle size, Dho (see Table 4.1); since the drawings specified that the D80 was the minimum allowed, this selection is conservative.
  • Three erosion levels were placed across the dam as shown on the Figure 4.2 at levels AA, BB, and CC,
  • For each level, a weighted average of the erosion category was determined according to the length of material exposed to the flow for that level:

c I=i L,EC,

  • . Where EC is .the average erosion category,. L1 is the length of material i exposed to water, and EC1 is the erOsion category for material i (low = 4, medium = 3and high = 2).
  • Section AA gave an EC value of 3.93, section BB gave 4.08, and =section CC gave 4.11.
  • Therefore, the overall average erosion category for Jocassee Dam is clearly .4 or low erodibility.

SP AG6E 13

t-...onir,* ,.*ecur-ny *en*,i.'.*uvo~gol(~ l,~~ - VVIUIUtQIQ ai[Oiii p.uuIwt ui~I.'GOsure* per :u i..rt't £.J*UJ(u/

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOcASSEE DAM Figure 4.2. Jocassee Dam cross section used in determination of erosion category Table 4.1. Jocassee Materials Evaluation by Briaud Material Estimated critical Erosion (Figure 4.2) Description velocity (mis) Category (b)(7)(F)

Rock fill Impervious core Random fill Filters The above conservative analysis by Professor Briaud clearly shows that the erosion category of the Jocassee Dam is low or Category IV, for erosion rates based on velocity or shear stress as shown on Figures 4.1a and 4b, respectively.

A similar evaluation was conducted by Professor Briaud for the Teton Dam since this dam was used by Xu and Zhang (2009) as an illustration and evaluation of their original regression equations. In addition, an application of the revised Xu and Zhang regression equations to the Teton Dam failure is reported in Section 6.5. Professor Briaud showed that the erosion category of the Teton Dam is at the boundary between medium and high or Category Ill/il, for erosion rates based on velocity or shear stress as shown on Figures 4. Ia and 4b, respectively.

The high resistance to erosion (low erodibility) of compacted rockfill has recently been affirmed by the experience of flooding and water passage through a rockflll embankment in the February 2014 flooding at the Tokwe-Mukosi Dam in Zimbabwe. The Dam is a Concrete Faced Rockfill Dam (CFRD) and experienced an extreme flood during construction prior to placement of the concrete face. It successfully passed extreme floodwaters through the compacted rockfill embankment with only local raveling and maintained stability. See Appendices C.1 and 0.2 for a description and photo s.

P A GE 1.4

  • .,;,.,., ,;,.,*  ;*,,;, .,,,,,*,. - ~;.';,;,,.;, ;,,.,, i.-;.;;., hlI.,; ,p,,. K £7F,;.J;*,I.-

SVALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 5.0 ORIGINAL XU AND ZHANG REGRESSION EQUATIONS in our February 2013 report (Ehasz and Bowles 2013) it was concluded that the HRR (DUKe 2013) breach hydrograph for the: Jocassee Dam iS a realistic but conservative breach hydrograph that has good defendability based on the following:

1) the validity of the Xu and Zhang (2009) method;
2) the conservative nature of the median brec aaeter estimates:
3) a piping failure mode initiating in thel jjjj(I 4), the deposition of rockfill immediately below~the dam; 5). the low erosion category of the rockfill material; and
6) the various characteristics of a modern dam that were included in the design and.

construction of the Jocassee Dam.

The original Xu and Zhang regression methodology and its previous implementation to Jocassee Dam are described in Appendix B. This appendix provides background for Section 6.

where we address the questions raised by the FERC .and the NRC. It also provides background for section 7 where we describe the implementation of a revised version of the Xu and Zhang equations in a sensitivity analysis, which provides support for the breach hydrograph submitted

'in the Hydrologic Reevaluation Report (HRR) to the NRC .by Duke on March 12, 2013 (Duke 2013).

Section B.2 Summarizes the breach parameters and control Variables in the Xu and Zhang (2009) regression equations. section B.3 discusses the case histories that were used to develop these equations and Section* B.4 summarizes the regression equations, including their confidence limits. The implementation of the original Xu and Zhang (2009) methodology for the Jocassee Dam is described in Section B.5 and details of the use of the failure time estimate in the HEC-RAS model are discuss~l in Section B.6.

P AG6E 15'

'VJI5 5I@*iI @G'UIII* 517 l~tw mlllVID1la

  • V. - IrWIrn4I55
  • V*4l**.'.*d*ll¥ Hl~ W ,..r I [I LI.IIl.J U
  • VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM 6.0 REVIEW AND REVISION OF XU AND ZHANG REGRESSION EQUATIONS 6.1 Approach to Review and Revision The FERC and NRC questions about the use of the Xu and Zhang (2009) methodology are summarized in Section 2.2 and are repeated here:
1) Precedence - where has use of the Xu and Zhang (2009) methodology been accepted?
2) Chinese case histories - about 43% of the dlam failure case histories on which the Xu arnd Zhang (2009) methodology is based are for Chinese dams for which little information is available in :the US.
3) Representation of case histories for roclcflll and other low erodibility dams - the data set of dams used by Xu and Zhang (2009)to develop the regression equations has only three dams that are considered large (i.e. > 15 meters high) embankment dams with low erodibility and both of these dlams are all outside of the US.
4) Use of the Briaud erosion categories - how Were the erosion categories developed by Briaud (2008) applied in developing the Xu and Zhang (2009) methodology and are they applicable tO dam breach?

5). Breach time definition,- the definition of time to failure used by Xu and Zhang (2009),

includes at least part' of the breach initiation phase in addition to the breach formation process unlike other regression methods that include only the breach formation process.

To respond to these questions raised by the regulatory agencies we arranged for the primary author of the Xu and Zhang,(2009) technical paper to meet with us in the Denver Offices of URS during the period, November 7 - 10, 2013. Those in attendance were Dr. Yao Xu of the China Institute of Water Resources and Hydropower Research, Dr. David Bowles with RAC Engineers

& Economists and, Utah ,State University, Professor Jean-Louis Briaud with Texas A&M University, Joseph Ehasz with URS, and Adam Johnson from Duke Energy. On the morning of Friday November 8, Dr. Xu and Professor Briaud independently met with Tony Wah!, Bruce Feinberg and Dan Osmun of the Bureau of* Reclamation (Reclamation) at Reclamation's Hydraulics Laboratory in the Federal Center near Denver. This meeting was in response to Tony Wahr's request to meet with Dr. Xu-during his Visit to the US to discuss his questions regarding the Xu and Zhang (2009) methodology.

The four-day working session was divided into two parts: first discussions of the agency questions and. second a detailed case-by-case ,review of the 75 case histories that were used to develop the original Xu and Zhang (2009) regression equations. The ultimate objective was to make appropriate changes to the Xu and Zhang (2009) case histories data set to address the agency questions and any other issues identified during our review so that Dr. Xu could develop revised regression equations.

P A GE 16

~VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM A summary of our discussions with Dr. Xu and Professor Briaud for each of the questions raised by the FERC and NRC and for some additional issues that were identified during these discussions is presented in Section 6.2. 'Specifically, these additional issues, which are discussed in Section 6.2.6 - 6.2.8, were'as'follows:

1) Erosion category assigned to dams with corewalls anid concrete-faced rockflll dams
2) Differences in values of breach parameters and control variable in other sources, especially Froehlich (!995a and'b and 2008) and WahI (1998)
3) Inconsistencies between peak br~each flows~and breach development times The changes made to the data set of case histories are summarized in Section 6.3 and detailed in Appendix D. The revised regression equations are presented in section 6.4 and their test implementation for Teton Dam is discussed in Section 6.5. Their implementation for Jocassee Dam as a sensitivity study to evaluate the HR R hydrograph is presented in Section 7.

6.2, Summary of Review Findings 6.2.1 Precedence In the U.S. dam safety community the acceptance of new methodologies often comes through adoption by the rniajor government dam, owners ,and regulatory ,agencies. These agencies include the US Army Corps of Engineers (USACE) and the Bureau of Reclamation as major government datm owners and the FERC as the federal regulator for hydropower dams. As with any new methodology it takes time for it to become accepted into practice and for precedence to be established. From'this perspective the Xu and Zhang (2009) methodology is st~i quite new.

In,the case of the Xu and Zhang (2009) methodology, the questions raised by the FERC and the NRC must be addressed as part of the process if this methodology is to become more widely accepted. Addressing these questions is the purpose of this section of the report.

The inclusion Of erodibirity in the Xu and Zhang (2009) regression methodology is widely recognized *as a Significant advantage over other breach parameter estimation regression analysis methodologies. In fact Xu and Zhang (2009) demonstrated that erodibility is the single most important control variable in Ipredicting all five breach parameters. Such a significant advantage justifies a careful evaluation of the Xu and Zhang (2009) methodologyto0 see if it can be more rapidly put to use in the profession.

H i i . wp

i i l . . El

.. * .......... *~~* l 5lll'*t~tZltl*

  • 5.. . a E U . *-* -t n' ., *.a-.
  • wow*oam*w *v*Mm @*jr VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSUE DAM Three uses of the Xu and Zhang (2009) methodology have been identified, as follows:
1) In developing a Simplified risk assessment procedure for small reservoirs for the equivalent of the dam safety regulator2 in England and Wales [the Environment Agency and the Department for Environment, Food and Rural Affairs (Defra)], HR Wallingford (2014) evaluated the Xu and Zhang (2009) methodology for estimating peak breach flows. In' their comparative study they concluded'that the Froehlich (1995a) and Xu and Zhang (2009) approaches both 'yield "conservative, estimates of peak breach flow for highly erodible embankment dams and that the physically-based HR BREACH model (Mohamed 2002) and the simplified AREBA model (HR Wallingford 2012) provide more realistic estimates.
2) The Xu and Zhang (2009) methodology *is included in the breach parameter methodologies that are available in the USACE HEC-RAS computer model, which Is widely used in the US for dam breach modeling. It Was also included in a discussion of "Hydraulic modeling aspects that are unique to performing a .dam break analysis" by Brunner (2011), who is the USACE Hydrologic Engineering Center (HEC) technical lead for the HEC-RAS model. In both cases a caution is given that "the data Xu and Zhang used in the development of the equation for breach development time includes more of the initial erosion Pieriod and post erosion period than what is generally used in HEC-RAS for the 'critical breach development time" (Brunner 2011). In addition it is stated that-".. because of this fact, the XU and Zhang equation .for brea'ch development time should not be used in HEC-RAS" (Brunner 2011). However, in a PersOnal Communication (December 2013) with Dr. Brunner he agreed that it was. reasonable to
  • iteratively change the breach progression relationship and the values orifice and weir coefficients in the manner described in Section B.6 for Jocassee Dam when using failure time estimates based on Xu and Zhang '(2009). He also expressed interest in replacing the original Xu and Zhang (2009) regression relationships in HEC-RAS with the revised relationShips that are described S ection 6.14.
3) We understand from Dr. Xu that the Xu and Zhang (2009) methodology is being applied by government agencies in China.

6.2.2 Chinese Case Histories

.About 43% or' 32 of the 75 dam failure case histories on Which the Xu and Zhang (2009) methodology is based are for Chinese dams. None of these case histories are included in the Wahl (1998) data base of case histories, although :that data base' may be due. for anupdlate and ifone is undertaken it would seem beneficial to include Case histories from China.

2,In England and Walesthe Environment Agency ,is responsible. for enforcement of reservoir safety requirements for specific reservoirs "in the: interest of safety" that 'are determined by Panel Engineers who .are appointed by the Secretary for State. Defra has a policy role for deveiopmnent of reservoir safety legislation and guidance.

P A 6E 18

',u.I*fa;bou~uuy *ur,.,u*vu In'urmr~nin- wannwu ,rrumpuDIIc asciosuiweper "U (~i.C [LJWu(O)

~~JRS Inassociation withRC VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM-SIn discussing the quality of data for the Chinese case histories, Dr. Xu stated that he felt that the available information was similar, in quality to what he had examined in his research for: case histories from. the US' and. some other countries. In at least .two cases-detailed failure investigations reports have been prepared for the Banqiao and. Shimantan Dam* failures. Dr. Xu referenced a report by Ru and Niu (2001), which contains information on many Chinese dam breaches. This report, is readily available outside of China. He also had access to a detailed database on dam failure Case histories, but this is not available outside China. However, Dr. Xu made extensive reference to this data base during-our detailed evaluation of the case, histories that were used as a basis for developing the Xu and Zhang (20.09) regression methodology (see Section 6.3).

.Dr. Xu also described a screening process that he performed before using the case history data from China and other countries in his regression analysis. Any case histories .where .significant Concerns existed about the quality of the available data were omitted. It should be noted that the Chinese data used by Xu include some more recent-dam breaches than used by others, such as Froehlich (1995 and 2008).*

We also enquired about the quality of construction, for the Chinese .case history, dams. Dr. XU indicated that dams designed and constructed before 1977 were not up to modern standards, and that modern construction methods and ,equipment were not used. Dams. constructed since*

1977 can be considered to meet modern standards. The .significance for the* Chinese case histories* is first that there are more of them because of the poorer standards prior to 1977.

Secondly, the poorer construction, and in particular the poorer compaction .of Chinese.

embankment dams constructed prior to 1977, would be expected to result in a more erodible-dam once a breach process has initiated. Unlike most other regression methods, for estimating breach parameters, thel XU and Zhang (2009) approach includes the erosion category as a means of accounting for the more erodible characteristic of the Chinese dams that were constructed prior to 1977. The .approach adopted' by Xu and Zhang (2009) to account for the effect of poor construction in the development-of their regression equations is summarized in Section .6.2.4. We also make reference to this .approach in. Section 6.3.2, in which we summarize the critical review that we. performed of the entire Xu and Zhang (2009) data set, including all Chinese case histories.

In summary, Dr. Xu demonstrated the overall validity of his' evaluation, of the case history, data from all sources, including China,* and that good. backup information exists, although, for some Chinese case histories access to this information is restricted. For the Chinese Case histories this conclusion is based on the detailed information that Dr. Xu provided from the data. sources

.of failure analyses and records, which he accessed during the detailed .review that we.

conducted with him over" a four-day period. Our detailed evaluation of all case histories is summarized in Section 6.3 and notes for specific case histories are presented in Appendix D. In addition, based on our detailed review (see section 6.3), we found that in a majority of-the cases a valid assessment of the case histories was performed by Xu and Zhang .(2009) as the P A 6, 19r

  • 'u...*.*.o=...*.*=.u..==.._1....=!.=,,,,=

vvvw= -*j

,,,,uoo,*,=,uo, ,*,,uouu u,=o ,.u

,,uuo uuuo,*, uo*,.,,.*u,,= I--- --

n-- .= ...*u.u.

VAIJDATION OF HRR BREACH1 HYDROGRAPH'FOR JOCASSEE DAM basis for the values assigned to the control variables-and breach parameters that were used in the regression analysis. The exceptions,, which resulted in our making some adjustments to the assigned values, are discussed in Section.6.3 and documented in Appendix D. The revised values were used in the revised regression analysis that is presented in Section 6.4 and used in a sensitivity analysis on the HRR breach hydrograph that is presented in Section 7.

6.2.3 Representation of Case Histories for Rockfill and Low Erodibility Dams The small number of case histories' for rockfill dams that are classified in the low erosion category is a reality :that is likely due to the intrinsic safety' of rckfill dams in general. Another limitation is the lack of case histories of the failure for large .(high) dams with a reservoir capacity similar to Lake Jocassee. This can be clearly seen in Figures B~la and b. However, when volume is plotted logarithmically in Figure EB*lb, which corresponds to its representation in the.

multiplicative regression equations, the extrapolation from the range of case histories to Lake Jocassee for The reservoir volume above the breach invert can be seen to be relatively less significant.

These limitations apply to all breach parameter regression methodologies. However, Xu and Zhang (2009) offset, these limitations to some extent by including case histories from China for the Danghe and Gouhou large rockfill dams. In addition, their inclusion of the Briaud (2008) erosion categor'ies as a control variable was another innovation that was intended to account for the important effects that differences in the erodibil ity of materials in embankment dams have on breach parameters. Still regression equations are limited in. their ability to explain all the variability' that exists in the available case history data. ,Incontrast physically-based approaches are less limited than regression equations because they introduCe a ,representation of the physics of the erosion, instability and hydraulics phenomena that determine breach processes,.

However, these approaches must be used in an appropriate manner that accounts for their own limitations and the resulting uncertainties in predictions when used to develop breach hydrographs.

6.2.4 Use of the Briaud Erosion Categories We asked Dr. Xu what information he used as the basis for the assignment~.of erosion categories to the case histories used in developing his regression equations. He described two-step process. In his first step the soil type within the dam was used to assign a range of erosion categories as low erodibility (LE) to medium erodibility (ME) for rockfill and clay and ME to high erodibility (HE) for silt and sand.: The second step was to evaluate the construction quality, particularly compaction effort, based mostly' on the period of construction to determine which end of the range of erosion categories to assign. For example, the period 1950 to 1976 in China, would be Characterized by .low compaction using human powered tampers, and after about 1977 in China high compaction would be achieved using machine rollers. Other useful P AG E 20

  • -*m*ir* * ..... =*. * ................. *=* .. . ...............................

II S W ' . I f Isocainwt VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM pieces of information such as dam cross-sectional :geometry, materials and slope surface protection were used as supplementary information for assigning the dam erOsion categories.

Professor Briaud's independent review confirmed the appropriateness of using *his erosion categories for dam breach parameter estimnation in the Xu and Zhang (2009) methodology. His review is summarized in Section 4 and detailed in *AppendixA.

The two-step approach dlescribed above is consistent with the Briaud (2008) erosion categorization approach as summarized below. The dam erosion categories high, medium or low are described by Xu and Zhang (2009) as a relative measure based on !the embankment material'compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information. Briaud (2008) found that the rate of erosion can be very different for different soils that are classified in different erosion resistance categories. Specifically, rockfill and clay are often associated 'with. medium to low erosion category while sand and silt are often associated with high to medium erosion category. Hence, material compositions are considered as, a primary basis for classifying *the dam 'erosion category. In addition, compaction conditions also play an important role in determining the dam erosion category, especially for dams constructed from fine soils. Briaud (2008) reported that the erosion resistance increases With compaction effort and that the effect is more significant for some soils with high fines contents. It was also indicated by Wan and Fell (2004) that ther erosion rate index of a soil is inflUenced strongly by the degree of compaction. As described by Dr. Xu, thle year Of construction and the associated compaction methods were therefore important information for judging the compaction condition of the case history damns, and hence the*assignment of dam erosion-categories.

6.2.5 Breach Time Definition As is well recognized, the predicted breach *times' from Xu and Zhang (2009) are significantly longer than those obtained*from other methodologies such as Froehlich '(1 995b and 2008). Xu and Zhang (2009) based their definition of breach development time on the definition by Wahl (2004), which states that *breach development begins when a breach has reached the point at which the volume of the reservoir is compromised and failure becomes imminent" and bends When the breach reaches its final size."; By 2013 WahI (2013) revised his breach time definition to be consistent with Froehtich (1995b 'and 2008). The difference between the definitions of failure time used in the original Xu and Zhang (2009) methodology based on Wahl (2004) and by-others is discussed in detail in S ection B.6.

We found that of the 30 case histories that were :used by Xu and Zhang (2009) to establish their regression equations for breach development time, only five also appear in the Froehlich (2008) data set. 'Of these five, three have the same values for breach development times in both data sets but for two (Apishapa and Teton dams) the Xu and Zhang (2009) values are just over three times the Froehlich (2008) valueS. In our detailed review of the case history data (see Section P A 6 E 22.

. .... ..... L: .. ........ ,.r . -lUI mffpigIp(iUI aIgaIIa JIU*JIIrM UIJ5CI,J*UIB- F-"-.-.-

DPI* -,*U - -

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOcASSEE DAM 6.3) we addressed this inconsistency by changing these values of breach development timesto match the Froehlich (19 95b and 2008) definition based on avail able information.

In our detailed review we found that in a few cases lower erosion categories had been assigned to damn breaches that had long observed failure times when all other available information about the damn, the materials from *Ahich it was constructed, and the quality of construction pointed to a higher erosion category. In our detailed review of the case history data we changed these to a higher erosion category for developing the revised regression equations that are *the sensiti vity studies presented in Section 7, since in applyin~g the regressioni equations one'would haVe no basis for this type of adjustment of the erosion category.

6.2.6 ErOsion Category Assigned to Dams with Corewalls and Concrete Faced Rockfill Dams In our detailed review of the case history data, we found that the term "corewall'" had been used for some dlams that had a claY core but not core wall constructed of concrete, masonryor steel to distinguish them from homogenous fill dams with no clay core. This was apparently a misunderstanding about the use of terminology in English and we corrected this in assigning the dam type control variable in the data set that was Used for developing the revised Xu and Zhang equations.

In some case we found dams thatl were assigned a. low erosion category as an indirect means of accounting for the throttling effects on breac~h development in embankment dams with a concrete core wall or for concrete-faced rockfill dams (CFRD). While this approach has some merit, it was judged that the breach parameters for embankment dams with a concrete corewall or CFRDs would not be representative of 'the erosional process' in low erodibility embankment dams in general,, and so we excluded dams with' a core wall or a concrete face from-the data set that was used to develop the revised Xu and Zhang reg ression equation s (see Section 6.4).

6.2.7 Differences in Values' of Breach Parameters and Control Variable in Other Sources, All values of the control variables and br'each parameters in the Xu and Zhang (2009) data set were compared with those found in other sources,, including the following:

  • WahI (1998) "best reliable information"
  • - Froehlich (1 995a and b and 2008)

, 'VonThun and Gillette (1990)

  • Costa (1985)
  • - Waider and O'Conner (1997)
  • MacDonald and Langridge-Monopolis (1984)

P A,Ge 22

  • v,.=*,**. VALIDATiON OF HRR'BREACi' HYDRoGRAPH FOR JOCA SSEE DAM Preference Was generally given to adopting values contained in the first two sources, although where available additional sources were consulted ,to verifY or change Xu and Zhang (2009) data set values. These additional sources included Singh (1996) and various internet sources that are referenced in Appendix D. The changed values were used to develop the revised Xu and Zhang regression equations that were used for the Sensitivity studies that are Presented in Section 7.

6.2.8 Inconsistencies between Peak Breach Flows and Breach Development Times An inconsistency was identified in many case histories between the peak, breach flowS, breach development times and the reservoir volume above the, breach bottom at the time of failure.

The inconsistency exists for many case histories in the Wahi (1998) data base and in the Froehlich (1995a and b and 2008) data as well as in the Xu and Zhang (2009) data. The inconsistency was identified by assuming that the breach outflow hydrograph has a general triangular shape with the base of the triangle representing the breach development time, the height the peak outflow rate, and the area of the triangle the volume of reservoir Contents above the breach bottom elevation. Under this assumption an approximate breach formation time can be calculated from simple geometry as follows:

T = 2Vw/Qp (6) in which:

T = Breach development time Vw Volume Of reservoir contents above breach invert at the time of failure Qp= Peak breach flOW rate On the basis that. the observed Values of Vw and Qp can generally be obtained with greater accuracy than the observed value of T, we compared the values of T calculated using .Equation 6 with the observed values in the .case histories: used by Xu and Zhang (2009) and those in Wahl (1998)r and Froehlich (1995a and b and 2008) and found significant differences, To avoid changing the case history values Of T in the widely accepted Wahl (1998) and Froehlich (1995a and b and 2008) data sets, we used those values to develop the revised Xu and Zhang regression equations that were used in the sensitivity, studies. However, we found, not unexpectedly, that this inconsistency resurfaces, when a similar comparison, is madea between predicted values of the breach development time and those obtained from Equation 6. We discuss this issue further in Section 7.2 and the approach that we have developed to address it.

P A 6 E .23

C.z---.; C'.3-'-.*;.. , .....

..... [;;,--.= v' - ;;;;,u*  ;, .,,, puum. , I;.ir;burw per w' t..iN £.J~u(UJ VALIDATION OF HRR BREACHI HYDROGRAPH FOR JOCASSEE DAM i ill.i p 6.3 Summary of Revisions to Case History Data Set 6.3.1 Approach During the Denver meetings the group questioned Dr. Xu about each of the 75 case histories that were used to develop the original Xu and Zhang (2009) regression equations. All values of the control variables and the breach parameters for the case histories were discussed and reviewed and notes were recorded in a spreadsheet (see Appendix D) during the meeting and to record the results of further scrutiny following the meeting. Professor Briaud assisted in the detailed erosion category review and this resulted in changes to several case histories.

In addition, all values of the control variables and breach parameters in the Xu and Zhang (2009) data set were compared with those in other sources that are listed in Section 6.2.7 and adjusted as appropriate.

6.3.2 Summary of Xu and Zhang (2009) Data Set Revisions used in the Sensitivity Studies A summary of the types of changes that were made were to the Xu and Zhang (2009) data set is as follows:

  • Changed breach development times to the Froehlich (1995b and 2008) definition of breach developm ent time.
  • Changed the values of other variables where they were inconsistent with the Wahl (1998) and Froehlich (1995a and b and 2008) data with consideration given to other reliable information that was found in various other sources m entioned in Section 6.2.
  • Changed assigned erosion categories to include the consideration that compaction associated with construction practices in the US and other developed countries (not China) improved for earthfill dams after about 1950 and for rockfill dams after about 1965. This is similar to the consideration used by Xu and Zhang (2009) for Chinese case histories before and after 1977.
  • Changed to higher erosion categories cases where lower erosion categories had been assigned because of long observed failure times but where all other available information about the dam, the materials from which it was constructed, and the quality of construction pointed to a higher erosion category.
  • Eliminated case histories for concrete-faced dams and dams with core walls or cut-offs (discussed below).

The above changes were made to improve the quality of the data used in the revised regression equations and to achieve consistency with the commonly-used Froehlich (1995b and 2008) definition of breach development time. In principle this definition was seen as a way to assign the duration of the breach hydrograph that is commonly developed using the HEC-RAS software; but as demonstrated in Section 7.2, it was found that another step was necessary to P A GE 24

L...... :. ~ ~ - u,,~mn,,rjprx* ,rflm

.. ...

  • Hv ,i,~i~in~iir~

nairuiu~ *. *

  • v ~51r
v. Ill
  • i:i-i# *. .AqflIflI
  • *
  • Ti v KE S association with i*

In C~EII VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA$$EE DAM estimate a breach development time that is consistent with the predicted values of peak breach flow and the reservoir volume above the breach bottom at the time of the breach. Overall the numbers of changes to US, China and other country case histories in the .original Xu and Zhang (2009) data set were as follows:

  • Reservoir capacity: 3 US changes
  • Dam erosion categories: 10 changes comprising 4 US, 5 China and 1 Brazil
  • Failure modes: 3 US changes
  • Volume of water above breach invert: 5 US changes
  • Depth of water above breach invert: 2 US changes
  • Breach height: 2-US changes
  • Breach average width: 4 US changes
  • Breach side slope: 2 US changes
  • Breach failure time: 9 changes comprising 6 US, 2 China and I Brazil In addition to these changes, twenty out of the 75 case histories used by Xu and Zhang (2009) were eliminated for the following reasons:
  • Concrete-faced dams: 5 total, I Argentina (Frias), I China (Gouhou), 3 USA (Davis Reservoir, Horse Creek, Swift)
  • Dams with core walls or cut offs: 8 total, I China (Danghe), 1 UK (Coedty), 6 USA (Castlewood, Elk City, Lower Otay, Lynde Brook, Winston, Wilkinson Lake)
  • Lack of reliable information: 6 total, 2 China (Niujiaoyu, Huqitang), 4 USA (Potato Hill Lake, Trial Lake, Upper Pond, Otter Lak e)
  • Not representative due a large volume reservoir with a small height dam that resulted in a long breach development time and a very wide breach: I US A (Hatfield)

The concrete-faced dams and dams with core walls were removed because their breach characteristics would not be representative of the erosional process for breaching of embankment dams in general. Specifically the concrete membrane would be expected to resist breach development and to have a throttling effect on breach development. Xu and Zhang (2009) assigned a low erosion category as an indirect means of accounting for these effects of a core wall or concrete face but this was judged to. bias the data set.

Given more time it is possible that additional information may have been obtained for some cases that were eliminated due to a lack of reliable information. Also it is possible that some accepted US and other developed country case histories, which were not included by Xu and Zhang (2009), could have been added to the dat a set.

P AGE 25

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA4$$EE DAM Lastly, and despite the Scrutiny imposed on the data ,from China :during our meetings, the Chinese case histories were omitted from the data set that was used: to develop the revised Xu and Zhang equations used in the Sensitivity studies. This *conservative step was taken to increase confidence in the revised Xu and Zhang regression equations by avoiding the potential criticism that we had only limited and indireCt access to the original references for the Chinese case histories. However, this step further reduced the total number of case histories from 55 to 27.

The numbers of case histories that Were used to estimate the revised best exact and best

  • simplified *equations, respectively, are as listed below:

. Breach depth (Hb): 23 and 23

  • Breach top width (Bt): 21 and 24

. Average breach width (Bare): 22 and 24

  • Peak outflow rate (Qp): 16 and 19
  • Breach development~time or failure time (TO): 14 and 14 These are significantly fewer than for the original Xu and Zhang (2009). However, as can be seen from Figures 6.1a and b, they cover the same range as the original data set. Figures 6.1a and b are similar to Figures B~la and b. Figures 6.la and b show the :depth of water above breach invert, Hw, and volume of'water at the breach time, Vw,, on arithmetic-arithmetic and adithmetic-log axes, respectively, for the 75 case hitds teoriginal Xu and Zhang (2009) data set and the 55 case histories in the revised data set. The 27 US or other country data remaining after the Chinese data are om itted can also be identified in these figures.

The revised data set include three low erosion category case histories, 11 medium erosion categories and 13 high erosion categories. It includes seven overtopping failures and 20 seepage-erosion failures.

6.4 ReVised Regression Equations for use in the Sensitivity Study Dr. Xu personally developed revised regression equations for the best exact prediction using all five control variables. He also developed the best simplified prediction equations as those that gave the highest R2 dj as obtained through a stepw ise regression procedure (see Section B.4).

The revised Xu and Zhang regression equations were developed using the revised case histony data as described in Section 6.3. As eXplained in Section 6.3.2, the. Chinese case histories.

were excluded from the revised regression equations that we used in the sensitivity study to evaluate the approprilateness of the HRR breach hydrograph.

P A 6 E 26,i

VA UDA In~OF HRR BREAO. HVMGRP FOAJOC4SSEE DAM OdIginal and Revised Ku and Zhang DataI 80 I

7O U I.

I.°: *USA. OrWmn A Other Oi*In.

IUjcuse. -Orignal X Clnr - Revised Other - Rlevise Xlocassee -Reid 0iI0 00 400 60 800 1000 1200 14100

  • bu. .m WII, ab:e, Iree* nv~irt Vae(a 105mrol a) Ardhmt4-r~thmet*c scales Origlinal and Reie Ku and ThanI Data ItN NI I

70 18 I°40 I Clna -Or~lnal 140 . N £* Oter.-Orignal

  • Joas..*

Mua.n

-OrtIgnal Revised x x,, *'K 1w° *m KiCasmee- Re~vised rO 10 x 0~

0.1 1 10 100

  • 4. of ,,wemim hIed* hImwt Vw (a 1OSm3) b) ArIthmetic-logartthmic scales Figure 6.1. Depth of water above breach Invert vs. volume of water at the breach time for the original and revised Xu and Zhang case histories.

P AG0E 27

JRhS InaoctonWtlLC VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM The coefficients for the revised regression equations are presented in Tables 6.1 and 6.2 for the best exact and best s implified prediction equations, respectively.

6.5 Application to Teton Darn Failure The revised Xu and Zhang equations were applied to the Teton Dam using the same control variable values as shown in Table 10 of the Xu and Zhang (2009) paper. We selected Teton Dam for this evaluation since, like the hypothetical failure for Jocassee Dam, the Teton Dam failed by piping, whereas the other dam evaluated by Xu and Zhang (2009), Banqiao Dam, was an overtopping failure. Since the evaluation of the erosion category by Professor Briaud, which is summarized in Section 4.2 (see Figures 4.1a and b), indicated that the Teton Dam lies on the boundary between the high and medium erodibility categories, we applied the revised equations for the high and medium erosion categories and then averaged the two Sets of median predicted values.

Tables 6.3 and 6.4 contain the observed and predicted values of the breach parameters for the original Xu and Zhang (2009) and the revised Xu and Zhang described in Section 6.4 for the best exact and best simplified equations, respectively. Two values of observed breach time are shown, 4 hours4.62963e-5 days <br />0.00111 hours <br />6.613757e-6 weeks <br />1.522e-6 months <br /> for the original Xu and Zhang (2009) definition of breach formation time and 1.25 hours2.893519e-4 days <br />0.00694 hours <br />4.133598e-5 weeks <br />9.5125e-6 months <br /> for the definition of breach formation time that is used in the revised Xu and Zhang equations based on the Froehlich (1995b and 2008) definition. In addition to displaying the median predicted values, the percent differences between the observed and predicted median values are presented. The lowest percent differences for the original Xu and Zhang (2009) or

  • the revised Xu and Zhang equations are indicated in red. For the best exact equations (Table 6.3) the revised approach yields smaller percent differences than the original equations for three out of five breach parameters. For the best simplified equations (Table 6.4) the revised approach yields smaller percent differences than the original equations for four out of five breach parameters. Therefore, for Teton Dam, the revised equation predictions have smaller percent differences with the observed values than the original X u and Zhang (2009) predictions.

The revised regression equations were also evaluated for the Teton Dam based on a mean breach time estimate that was obtained from the uncertainty distribution on predicted peak outflow and the volume of water released through the breach. The basis for this estimate is discussed in Section 7.2 in which the mean estimate is distinguished from the median estimate, which results directly from the multiplicative regression equations for all breach parameters except breach depth. The resulting estimates are provided at the bottom of Tables 6.3 and 6.4 for the best exact and best simplified equations, respectively. In both cases they significantly overestimate the observed breach time. However, these estimates may be reasonable for a reservoir with the stored volume that Teton had at the time of its failure and that the observed breach time was shorter than predicted by the regression equations because of an unusual failure mechanism that has been documented by the Teton Dam owner, .the Bureau of P AG E 28

t.*LllliCJlll*) "*'I,,UIIILW t*IIOIUWG IIIIU#IalOUUeII -- -- ...........

. .. . .. wmrluaula* aJ *. at_ I*. -"...........

ar*

  • 1IF

-- J VAUDA1TION OF HRR BR*EAC.H H VROGReAPH FOR JOCASEE DAMA Table 6.1. Summary of the five revised Xu'and Zhang best exact regression equations __

Breach Parameter Number Contr-ol bO J b32 I j JS2yvlx(or

-Variables Y(orlogY) of Cases .0lgO (lg) onlonebr bi b2 b31 I ,,I633 b41 b42 b51* b52 b53 R12 s2ivyi 1 ,)

f069

.. . ...... ...... .. Reservoir _ _ __ Dam Type .mErodi1 lty_______ _.;.....

Inecpit SaeCore Wall CFRD oogOvertop Piping High Medium °Low Hb/A'4, 23 X1,2,3A4.5 0.449 -0.023 0.002 .0.134 ____ 0.138 0.1_78 0.271 0.222: 0.1.86 0.04'1 0.375 0.016 Iog(Bt/flb) 21 lnX1,2;3,4,5 0.088 0.127 0.620. 0.122 ___ -0.053 0;.2,40 -0.328 0.246 -0.201 -0.133 0.594 .0O.213 2 n~,23,*

_________ - ______02 Coef. -0.425 ______ Zoned  : 022 07 -0_1__ ___67_ 0.___7 Iog[ave/HbJS/3 22 InX1,2,3,4.5 -0.308 ;0.029 -0.890 -0.452 -___

0.409 -0..7.3 -0.759 -0.225 -0.378 -0.823 0.670 0.273 Iog('17/ Tr) 14 INX12,23,4,5 -0.883 O.017 0.715 0.47 ___ -0.678 - *1.114 0.232 .- 0.619 -0.442 0.178 0.646 0.902 Table 6.2._Summary of the five revised Xu and Zhang best simplified regression equations ___

Breach Parameter Number- Contr-ol bO b b2 b 1 b 2 1 b 3 4 I 42 51 b2 1 b S2vl 5(or Y(orlogvl of Cases (tgnhier CorlogbO) . ____ R S2tcezieX).

Reserv'oirl__" _ Dam Type ____ ___ Erodibility Cate io/ ......

Intercept Hgt Shape CoeWl ID HomogOero Ping ih Mdim .w

_______Coef, __ore_ Wall ___R Zoned .Overtop Pii___ig __di_ Lo Hb/H~d 23 X1,45 0.673 -0.021 __ .0,.,00. -______ 0.089 0.297 0.26 0.117 __ 0.133 0.013 Iog(Bt/Hb) 24 .InX2A4,5' -0.241 '0.72 ___ __ 0.121 40.363. 0.23 -0.027J 0.201 0.592 0.181 Iog(Bove/Hb) 24. Inxz4,5 1.577. ___ 0871

, ,,,_ -1.122 -1*968 -0;667 -1,346 -10O77 0.628 0.245 lo p(Qo/i'gVw5/3) 19 InX2,5 -2.80 _O _ -1.222 ____-0.55 -1.069 -1.281. 0.84 .0.216 Iag(TJ/Tr) 14 INX2,3,5 -1.382 ____ 0.859 .0.14 ____ -0.132 --0861 -05$3 0.009 0.085 0.538 S u*

~PA 6 E -29

VAUDATION OF HRR BREACH HYRGRP FOR JOCA SSEE DAM Table 6.3. T,* ton Dam predicton using best exact equations

[Oriinal Xuand H Revised Au and Thn Predictions Observed Original -Median ,High Erodibillty Medium Erodibility Mdu rdblt Breach Parameter Units Percent Differ-,nce DIffemrenc Value Value wt Uer Lower Median Upper Lower Medliant Value Height o breac Breach top width m

m

___ 19 Observed

-7" 8 _l* _4 1 151 _* _

5 5 1 _* 5 _4 15  %

Avemeie breach width m 151 *'hi Peak outfow m*s *m2 752, 1651 Breach formation time - Original Au and Zhang hours ZiZ I

0. 0.7 9.i 1 0. (LI 1019 -*i Breach formation time - Revised Au and Thanl hours 1.E Table 6.4. Tetc mn Dam predic dtons using best simplified equations Observed j

Orgirsal Au and m~angl 2tl) redcitons Revised Xu and Thang Predictons Averag High &

Original - Median HhErodibility Medium Er'odibtlity Mdi Breadh Parameter Units Percent Difference I I J JPercent Value Value wt 1 Upper Lower Median Upper Lower Median Value ielst oE breach m ____

____ -11% ~ 2 jwit Breadh top width m 3 ______ .J!L~ .521 ___O__ served_

Average breads withl m 151 12w -1651 Breach formnation time - Original Au and Th*ang hours 4__

Brmadi fornstion time Revised Xu and Tha* hours 1.*

I 1161 (Lii 3.41 OMI (Lii &TW ~1 Mew P7s3 PAGE 30

i.unwarw .wcura~y .*un~,Uve irormauon - wennow rrom puww desciOwurw per wu w-K £.JWJ,(a)

VALIDATION OF HRR BREACH HYDROGR4PH FOR JOCASSEE DAM Reclamation (Osmun 2013). The failure mechanism involved the development of a large cavity piping of the core materials into the downstream rock had been unnoticed. The piping had within the dam. which formed due to the pervious nature of the foundation and the fact that moved embankment materials and continued for many days or even weeks and formed a large Cavity within the core/center of the dam. Once the cavity collapsed it caused a very sudden failure with a shortened breach time, because a significant amount of material had already been eroded from within the dam, causing an enlarged and sudden opening, which is uncharacteristic of a normal erosional breaching failure. This failure mechanism is discussed in more detail in Appendix C.2.

P AG6E 31

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM 7.0 REVISED XU AND ZHANG REGRESSION EQUATIONS SENSITIVITY STUDIES 7.1 Overview of Approach A sensitivity study Was performed to explore the effect of the revisions made to the original Xu and Zhang (2009) regression equations on .the breach hydrograph for a piping failure of Jocassee Dam and compare with the HRR breach hydrograph submitted to the NRC by Duke (2013). The revised Xu and Zhang regression equations were applied to the Jocassee Dam to obtain the median estimates of the breach parameters and their confidence intervals. The revised equations were for the case in which we used the Froehllch (1995b and 2008) breach times and with all Chinese case histories omitted.

The spreadsheet that we used in our previous work to implement the original Xu and Zhang (2009) regression equations (Ehasz and Bowles 2013) was generalized such that a new set of regression coefficients for the revised equations can be input. To calculate the confidence intervals we also input the standard error of regression, the number of control variables, and the number of case histories used to develop each regression equation. The modified spreadsheet was verified against the original version in which the regression coefficients were hard wired and for the applications to the Teton and Banqiao Dams to verify that we closely matched the results published by Xu and Zhang (2009).

The breach parameter estimates obtained from the revised Xu and Zhang regression equations are presented in Section 7.2. Section 7:3 contains an example of inconsistencies between peak breach flow and breach development time for the Jocassee Dam breach hydrograph for the breach Case 2(I00VV) submitted to the NRC by Duke in support of the Safety Evaluation (SE)

(NRC 2011). The HEC-RAS implementation by HDR of the revised Xu and Zhang regression equations breach parameter estimates to obtain a breach hydrograph for Jocassee Darn and a comparison with the HRR breach hy drograph are discussed in Section 7.4.

7.2 Revised Xu and Zhang Breach Parameter Estimates for Jocassee Dam

'The resulting median and 95% confidence interval estimates (lower and upper bounds) are presented on the left Side of Table 7.1 for the revised best exact equations. In addition the breach bottom elevation and average side slopes are calculated and displayed.

For comparison, Table 7.1 .also displays the Froehlich (1995a and 2008) estimates of the breach parameters. Considering the widths of the confidence intervals for both methods, the two methods provide fairly similar median estimates (see Figure 7.1). In particular the median peak outflows; median breach top widths and median breach formation times are quite Similar.

The similarity of the median breach formation time estimates follows from changing the definition of failure time in the revised Xu and Zhang methodology to match that in Froehlich P AG6E 32

. . .... . . .. . .. . .. L.lr_'.-..."....  :

A.....

it-J .. . .........

DAMl I

.FORJOCA$S£E IJIUS In association with RALC VALIDATION OF HRR BREACH HYOROGRAPit VALIDATION OF HRR BREACH HVDROGRAPIY FOR JOCA SSEE DAM A

p Table 7.1. Breach parameter estimates from a) revised XU and Zhang without Chinese case histories the Froehlich breach time definition, and b) Froehlich (1995a and 2008)

Revised Xu and Zhang Without (hina Frelc "9bn 08 BreachParameter Froehllch Breach Times

____________________ Upper Lower. Median i Upper Lower Median Heigh1t of breach (feet) *1: 7 7 2 25.7 BreaCh formation time (hours) ,, b*)F Breach top width (feet) 2,78"7 363 1,009 3,384 ,587 1,082 Average breach width (feet) 2,007 206 643 3,392' 395 889 Peak outflow (cfs) 'b!)F Breach bottom elevation (feet msl) 743 9531 848 850/ 880 850 Average side slopes (lhoriz.-vert) 20 ,0.9 I.3 0.7l 0.,7 0.7 nUOia=traom re..re.s~slOn .Norm~al =linput vaiue' ,rucs =caicuiateoarrom orner values. - .. .. ..

YVolumne above breachblottom (acre-feet) . . . ... 1*9,836 1 1 ,117,818:!

.Triangular breach formation times (hours) - 1. .:" .,.

14.0 13.0 12.0 I.

  • 11.0 *-* , ,

10t.0

"*9.0

,* 7.0 5.0

-4 . 7].. . _

4.0

.*. 3.0 2.0 1.0 Failure Breach top Breach top. Average Average Peak Peak Height Failure*

breach-of Height breach-of time - tine,- width - width. breach breach outflow- outflow -

Revise.d Xu Froehlich Revised XuuFro ehllch Revised Xu Froehllch width - *width

  • RevisedXu Froehllch

& Zhang & Zhang & Zhang Revised KU Froehlich &Zhang

  • &Zhang Breac:h P'arameter.- Regression Methodology Figure 7.1. Relative width of Confidence intervals for the revised Xu and Zhang and Froehlich (1995a and 2008) breach parameter estimates for Jocassee Dam expressed as a ratio to the median estimate (ratio = 1.0).

(1995b and 2008). The confidence bounds for the revised Xu and Zhang regression equationsr are wider than those for FroehliCh (2008) due tO the smaller number Of case histories that remained in the revised Xu and Zharng data set. !nterestingly° there are other case histories with observed values of failure time that included in Froehlich (2008). but which are not included in P AGE 33'

I[..flflfrfl v v

  • .lflR r'_lfl__

vw *

  • lfR*,lrl~d*"
  • .v v

_ aNrm]']f .arl~ljra - in.I/I.]

W 7 I*lll #

E ~

    1. Villi

]I  :;m....:

.~~~l

. .z ..T5 s f li U VALIDATION OF HRR BREACH HYDROGRAPH FORJOCASSEE DAM the original or revised Xu and Zhang data set. We could have added these but our focus was on workinlg With those that Xu and Zhang (2009) had originally used rather thanl adding new cases.

The median estimate for the breach bottom elevation of 848 feet msl. (and: hence an estimated height of the breach of 277 feet) predicted by the revised. Xu and Zhang method is very similar to the assumed value of 850 feet msl. (and hence an estimated height of the breach of 275 feet) that We independently estimated in our application of the Froehlich (2008) method since that~

method does not predict this .breach parameter. We .based that estimate on the expectation that there would be significant deposition of. material immediately below the darn that would limit the downward breach development. This position is consistent with the. experimental tests on the rockffll dam breaching process by Franca and Almeida-(2002), which showed that "the

.deposition of the rock blocks: immediately downstream, of the dam has a stabilizing effect, sustaining,the, failure process - this is reflected mainly on the final breach depth which is about 80% of the dam height." In addition, many embankment dam failures case histories document that breaches less than the full dam height have occurred. However, since so few rockfill dams have failed, the experimental work of Franca and Aimeida (2002) is probably the .best indication of the reduced breach depth associated with a rockfilll dam failure due to deposition immediately downstream of the breach.

It is noted that a breach bottom elevation of 850 feet msl. corresponds to releasing about 96%.

of the reserVoir contents below the initial normal full pool at Elevation 1,110 .feet msl. This compares with about 96.5% of the reservoir 'contents- below Elevation 1,110, feet msl. for" a breach bottom at Elevation 848 feet rnsl., which was predicted using the revised Xu and Zhang regression equations that was used in the sensitivity studies. For the original Xu and Zhang (2009) regression equations, .which were used as the basis for the HRR breach hydrograph (Duke 2013), the predicted breach bottom elevation of 870 feet msl. corresponds releasing

  • about 94% of the reservoir contents below Elevation 1,110 feet msl.

An additional sensitivity case is described at the end of Section 7.4 in which the breach bottom elevation was set to Elevation 800 feet msl. and, all the other breach parameters were kept identical to those used forrthe HRR breach hydrograph (Duke 2013). Even though this run was performed in a conservative manner, it was cconclUded that-.a lower breach bottom-does not significantly change the. breach. hydrograph.

The largest difference between estimates from the revised Xu and Zhang and Froehlich (1995b an 2008) methods is for the average breach width and as a result of that, the side slopes. The average side slope, value of 0.7 was assumed in our application of the Froehlich (2008) method.

following a recommendation by Froehlich (2008), whereas the larger values from the revised Xu and Zhang method are predicted Values. As described below in/Section. 7.4, where these different median values were usedrby HDR in the HEC-RAS model there is some effect on the:

breach hydrograph shape due to the different breach cross-sectional areas, but not on the peak p A GE 34v

VALIDATION OF HRR BREACH HYDROGRAtPH FOR JOCA-SEE DAM breach flow rate since it is determined by matching the median values for peak outflow predicted by the-resPective methods..

Returning to the estimated median breach formation times from the revised Xu and Zhang and the Froehlich (1995a and 2008) methodologies, we conducted a- simple check on the reasonableness of these predicted times and their consistency with. the..predicted peak outflow rates and Volume of the reservoir contents above the breach bottom elevation. The .check involved assuming that the breach outflow hydrograph has a triangular shape with the base of the 'triangle representing the breach formation time, the height the peak outflow rate, and the area of the triangle the volume of reservoir contents above the breach bottom elevation. Under this assumption ani approximate breach fOrmation. time can be calculated from simple geometry based on Equation 6, which is presented in Section 6.2.8.

The breach formation times estimated from Equation 6 are given at the bottom of Table 7.1.

These times, are clearly much longer than those obtained from both the revised Xu and Zhang and the Froehlich (1995a and 2008) regression m ethodologies. The sources of these significant inconsistencies in breach formation time estimates for Jocassee Dam, are believed to include, the following:

  • , Inconsistencies between case history estimates of observed breach times, peak outflow rates and .volumes of the reservoir contents above the breach bottom elevation in the Wahl (1998), Froehlich (1995b and 2008),and Xu and Zhang ,(2009) data sets (see Section 6.2..8)
  • The breach formation time is apparently not well represented by the regression equation methodologies for the large volume of the contents of Lake Jocassee above the breach bottom, which at the normal maximum reservoir level is about twice the volume of water for .the case history with the largest reservoir breach rvolume (Oros, Dam) and about four times the corresponding volumes for the Teton Dam breach (see Figure B.la).

The HEC-RAS simulation model predicts a breach hydrograph with a volume equal to the reservoir Contents above the breach bottOm elevation. Iln such a simulation it would be impossible to match both the predicted values of breach formation times and peak outflow rate from either the revised Xu and Zhang or the Froehlich (1995a and 2008) regression methods because the predicted breach formation. time from the regression methods is too short to release the reservoir, contents.. This 'is illustrated for the Safety Evaluation (SE) (NRC 2011) breach hydrograph for Jocassee Dam in Section 7.3.

Therefore it is clear that both regression methods underestimate the breach formation time for the large volume reservoirs such as Lake Jocassee. To address this shortcoming we developed an adjustment through following procedure, which is described below for the revised Xu and Zhang methodology with references to Figure 7.2:

P A6E 35

'I)

r, ~X..JLt-; Lfonzgzc ~AWi.tz!d him wrtft tffm'2cr ,jrrw I" {7C0 )

In association with 1t 44~~3 VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM ob)(7)(F)

Figure 7.3. Distributions of predicted peak breach outflow rate and breach development time - Froehlich (1995a and 2008)

P A GE 36

~VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM

, 'The entire probability distribution representing estimation uncertainty for predicted peak breach outflow rate was developed from the 1= through the 99th percentiles using the same equation that was used to calculate the upper and lower bounds by assigning the value of the Student t statistic corresponding to each percentile (left plot in Figure 7.2).

  • The distribution, of predicted peak breach outflow rate (left plot in Figure 7.2) was transformed to a distribution of breach formation times (right plot in Figure 7.2) using Equation 6 based .on the triangular breach hydrograph approximation applied to each percentile.
  • Calculate a mean breach formation time needed to release the reservoir contents from the distribution of breech formation times (right plot in Figure 7.2). This was calculated to be cb)(7)(F) I(see the blue dot-dash line on right plot in Figure 7.2), which corresponds to about the 3 4 th percentile.
  • Obtain ,the mean peak breach outflow rate that is consistent with the mean breach formation time needed, to release the reservoir ,contents using the triangular breach hydrograph aporoximation .- that is. cor~responding to the 34th percentile. This was calculated to bel~)()(F J Icfs (see blue dot-dash line on left plot in Figure 7.2).

The mean breach formation time o*D()F Iwas used in HEC-RAS as the time between points B and D as defined on Figure B.4 (see also Figure 7.5 in Section 7.4) together with the median estimates of the breach geometry from the reVised Xu and Zhang methodolog.j-HEC-RAS was then run to approximately match the mean-peak breach outflow rate ofb)7)f) cfs by iteratively changing the values of the orifice arid weir coefficients and the breach progression relationship as described in Section 8.6.

The above-adjustment procedure for addressing the shortcoming with the predicted breach formation time was also applied to the Froehlich (1995a and 2008) methodology. The resu*g....

mean breach formation time needed to release the reservoir contents was calculated to be LZF")'

(b()()(see the green do~t~Ish .line ojn right plot in Figure 7.3) and the corresponding mean peak

  • breach outflow rate oj(*)(OF) j cfs. both of which are at about the 40O~ percentile on their respective probability distributions.

The adjustment described above relies on the relatiVely precise knowledge Of the volume of the reservoir contents above the breach bottom elevation and the predicted values of the peak breach outflow rate, which' of all the breach parameters have the highest R2 valUes for both the revised Xu and Zhang methodology (R2 = 81%) and the Froehlich (1995a and 2008) methodology (R2 = 93%).

Table 7.2 contains a comparison of the breach parameter values used to develop the breach hydrographs in the Safety Evaluation (SE) (NRC, 2011) (discussed in Section 7.3), the HRR (Duke 2013) (discussed in Appendix B.6) and the two 'sensitivity studies (discussed in Section 7,4). Table 7.3 contains the comparison of estimated Jocassee Darn peak breach u ij ill  : i P AGE 37,

tv.,,u;,oii-p , * .;,o';u .u.a - vvninnumg ,'urn puu'Ic uisvwsure per iv L*u'K Z.JIuO IJS nassociaion with RA C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM iiii t l t ii w Table 7.2. Comparison of breach parameter values used in the Safety Evaluation (SE)

(NRC 2011), the HRR and the Sensitivity studies SJanuary 2011 3/12/2013Sestvy- Snitit Breach Safety Hazard Renstvise yXan Srehsithi(1ity Prmtr Evaluation (SE) Reevaluation - Reviad g and 2008)ch(195 Parameter (NRC 2011) - Xu and Zhang anad208

_________ Froehlich (2009)

Figure No. for breach 7.4 B.5 7.5 7.6 hydrographs ________ _______

Top Width (feet) 1,156 701 1,009 1,082 BotmWdh425 431r 277 696 (feet)

Bottom Elevation80878485 (feet msi.) ____00____ ____70____ 848_______ ____50__

(.)(7)(F)

Breach Formation Time (without piping phase) (hou rs)

Peak Outflow Rate (million cfs)

Side Slopes Right: 1.55, Left: Rig ht: 0.53, Left: vrg . vrg .

(horiz:vert). 0.7 . 0.53 Aveag 1.3 Avrg .

P A.6 E 38,

Coninins *ecuriwl -.*enslruvs In.rirnaton. vvnnuiu nwm,

- uuu,J* up-*---Ju-au. gin.

a----- .u *.arg

- ----. I--,

Wv.--.W ..... , ...... rJ .Fv ................ W ..... ................. ii* .....

Jd*t.IL*

  • VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Table 7.3. Comparison of Estimated Jocassee Dam Peak Breach Outflow Rates provided in the Safety Evaluation (SE) (NRC 2011)

Model Peak Outflow (cfs)

McDonald & Langridge-Monopolis (1984) IX)F Costa (1 985)

Evans (1986) scs (1981)

Bureau of Reclamation (1982)

McDonald and Langridg e-Monopolis (1984) ____________________

outflow rates from several regression methodologies that was provided in the Safety Evaluation (NRC 2011).

Table 7.4 summarizes the basis for each breach parameter estimate used in the sensitivity studies that are discussed in Section 7.4. In all cases they are the mean or the more conservative median estimate of the breach parameters. In our FebruarY 201.3 report (Ehasz and Bowles 2013). we concluded that the use of median values of the breach parameter estimates for Jocassee Dam would be a conservative ,choice. We argued that in reality we would expect that the peak breach flow. rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates, which is the range in which the peak breach flow rates fall for both the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 200.8) methodologies. The reasons for expecting the peak breach flow rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates include the fact that Jocassee Dam was designed and constructed as a modern rockfill dam such that it would be expected to be a more resistant dam to the breach process than other low erodibility dams for which failure data were used to develop the revised Xu and Zhang and Froehlich (1995a and 2008) methodologies. In addition, the uni-directional breach formation starting at the right abutment and the downstream deposition of rockfill material Table 7.4. Summary of the basis for each breach param eter used in sensitivity studies Basis for estimate used in sensitivity Breach Parameteranlss_______

Peak Outflow, Q Mean Conservative Breach development Mean Conservative Consistent with time, T Qp& V Breach depth, Hd Mean Conservative Breach top width, Bt Median (> M ean) Conservative Breach average width, B Median (> Mean) Conservative P A GE 39v

am *mlm *mmV I--.

  • lISIn association withRA VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA5SEE DAM leading to development of tailwater during breach formation also support the peak breach flow rate for Jocassee Dam to be in the range between the mean and lower bound confidence interval estimates. Mohamed (2002) demonstrated that a "side breach" results in a significantly lower peak breach flow rate and narrower breach* width than a "center breach" in simulations of the Teton Dam failure.

7.3 Example of Inconsistencies between Peak Breach Flow and Breach Development Time Figure 7.4 contains the Jocassee Dam breach hydrograph for the breach Case 2(100W) in support of the Safety Evaluation (SE) (NRC 2011) based on a HEC-RAS simulation. The Jocassee headwater hydrograph is represented by the blue line (left scale

  • 1000), the Jocassee tailwater hydrograph is represented by the brown line (left scale
  • 1,000) and the Jocassee breach discharge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam. The assumed sinusoidal form for the breach progression relationship is shown by the black line (left scale).

The peak breach flow rate for the Safety Evaluation (SE) (NRC 2011) hydrograph shown in Fiue7.4 is abo *()(7F) cfs for the SE hydrograph based on using a breach formation time

'*b)(7)(P)

Figure 7.4. Jocassee Dam breach progression relationship and breach hydrographs based on the breach Case 2(100W) in t he Safety Evaluation (SE) (NRC 2011)

P A GE 40

l P Inassociation.,w *ithRL VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM m i .p o4(D(7)*) and median breach geometry parameter estimates based on Froehlich (1995a).

The inconsistency between the peak breach flow rate and the breach development time for the SE breach hyrgahis cleanl seen in Figure 7.4 because the breach progression *relationship reaches 100% aftep(7 )(Fj j which implies that the breach develgpment is~ complete at that time. However, at this time the simulated breach flow rate is abouJ~b)(F)F Jcfs. The breach size certainly would not have stabilized at such a large flow rate and would be growing quite rapidly. If a more realistic and longer breach development time, consistent with emptying the reservoir contents* had been used the *a.~ilow rate would have been, much smaller (the breach time ~would need to be longer thatq' "Jas in the S E hydrograph and the peak outflow rate of[L)(TF) ...... Jcfs would decrease for a longer breach time). This type of physical inconsistency is determined by the underestimation of the breach development time that is input to HEC-RAS based on the estimate from Froehlich (1995b)3 . The HEC-RAS model does not simulate the physical erosion and instability processes that would take place in an actual breach and therefore the model has no way to assure a consistent simulation unless a consistent set of breach parameters are input to the model. Achieving this consistency is the purpose of the adjustment that is described in Section 7.2 to account for the *time required to completely empty the Jocassee reservoir and which is applied in the sensitivity analyses presented in Section 7.4.

7.4 Discussion of HEC-RAS Results Figure 7.5 contains the breach hydrographs developed by HDR using HEC-RAS based on the breach parameters estimated from the adjusted revised Xu and Zhang regression equations with the Froehlich breach development time definition and the Chinese case histories excluded as summarized in Section 6.3.2. Figure 7.6 contains the breach hydrographs based on the breach parameters estimated from the adjusted Froehlich (1995a and 2008) regression equations. The predicted values of peak breach outflow rate and breach development time for both the revised Xu and Zhang and the Froehlich (1995b and 2008) methodologies are therefore the mean ,eStimates obtained using the adjustment as described in Section 7.2 to account for the time required to completely empty the Jocassee reservoir (see Table 7.4). In Figures 7.5 and 7.6, the Jocassee headwater hydrograph is represented by the blue line (left scale

  • 1000), the Jocassee tailwater hydrograph is represented by the brown line (left scale'*

1,000) and the Jocassee breach discharge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam.

The breach progression relationship, which is a required HEC-RAS input, and which was developed iteratively as described in Section 7.2, is shown by the black line (left scale). Points A, B and D are equivalent to points that are defined in Figure 6.4. The final values of the orifice 3 A similar underestimation of breach development time has been identified in Section 7;2 for Xu and Zhang (2009).

P AGCE 42.

,JR Ina +otonwith VAUIDATION OF HRR BREACH HYDROGRAPH FOR JOC.ASSEE DAM p

Figure 7.5. Jocassee Dam breach progression relationship and breach hydrographs -

sensitivity run using revised Xu and Zhang breach parameter estimates D:)fTj(F)

Figure 7.6. Jocassee Dam breach progression relationship and breach hydrographs -

sensitivity run using Froehlich (1995b and 2008) breach parameter estimates P A GE 42

VALIDATION OF HRR BREACH H VDROGRiAPH FOR JOCASSEE DAM coefficients of 0.1 for both the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) breach parameter estimates appear to be reasonable in terms of representing a piping flow through the rockfill material. Similarly, the final values of the weir coefficients 2.2 and 2.0 for the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) breach~parameter estimates, respectively, appear to be reasonable in terms of representing flow through the breach following .collapse of ther dam crest of the rockflll dam.

In addition, the form of the resulting breach hydrographs Shown in Figures 7.5 and 7.6 also appear to be reasonable for a piping failure mode and closely match the mean peak breach flow rate estimates obtained for the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) methodologies,.respectively. Point A represents the beginning of the HEC-RAS simulation of the enlargement of the pipe. The breach progression curve was adjusted to keep the flow rate to a reasonably low magnitude prior to the collapse of the pipe and the onset of overtopping that is simulated at point B on Figures 7.5 and 7.6. These points mark the end of the breach initiation phase as defined in the revised Xu and Zhang methodology, which is consistent with the definition used by Froehlich (1995b and 2008) and Wahl (2013). Point D on Figures 7.5 and 7.6 marks the end of the breach development phase. The times between points B .and D in Figures '7.5 and 7.6 are approximately equal to the mean breach development time estimated using the adjustment described in Section 7.2 for both the revised Xu and Zhang and Froehlich (1995a and 2008) methodologies, respectively.

When Compared with the breach hydrographs from the HRR (Duke 2013), shown in Figure B.5, we conclude that. the breach hydrographs in Figures 7.5 and 7.6. which are based on the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) breach parameter estimates, respectively, provide good support for the HRR breach hydrographs (Duke 2013). In our February 2013 *report (Ehasz and Bowles 2013) we concluded that the breach hydrograph in Figure B.5 is a realistic but conservative breach hydrograph that has good defendablity based on the validity of the Xu and Zhang (2009) method, the conservative nature of the median breach~parameter estimates, a piping failure mode initiating in th*())F) Jthe deposition' of rockfill immediately below the dam, the low erosion category of the rockfill material, and the various characteristics of a modern dam that were included in the design and construction of Jocassee Dam.

An additional sensitivity case was considered in which the breach bottom .elevation was set to

,Elevation 800 feet nmsl, corresponding tO 99.4% of the reservoir contents below the initial normal full pool at Elevation 1,110 feet msl, and all the other breach parameters were kept identical to those used for the HRR breach hydrograph (Duke 2013), including the breach progression relationship. The resulting hydrographs are presented in Figure 7.7 using the same format as used in Figures 7.4, 7.5, 7.6 and B.5. The effects of the. lower breach bottom elevation, can be seen by comparing the results in .Figure 7.7 with those in Figure B.5 for the HRR breach hydrograph in which the breach bottom elevation was at Elevation 870 feet msl, which is the P A 6E 43

tISIn association with J VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Figure 7.7. Jocassee Dam breach progression relationship and breach hydrographs -

sensitivity run using breach bottom elevation of 800 feet msl. and all other breach parameters identical to those in the HRR breach hydrograph (Duke 2013) based on Xu and Zhang (2009) estimate based on Xu and Zhang (2009), and which corresponds to 94:1% of the reservoir contents below the initial normal full pool at Elevation 1,110 feet msl. In the simulation the additional reservoir contents is released mainly on the falling limb of the hydrograph resulting in higher flows for much of the falling limb starting with a somewhat flat portion of the hydrograph following the peak flow rate. Although it is considered that a more realistic simulation of the lower breach bottom would tend to lengthen the falling limb rather than raising it, we view this simulation, in which the breach development time was constrained to match the time used in the HRR hydrograph, as a conservative case in terms of the effects on the downstream flow conditions. Therefore a more realistic simulation was not pursued and it was concluded that a lower breach bottom would not significantly change the breach hydrograph even under the conservative sensitivity case summarized above.

The discussions in Appendices C.1 and C.2 benchmark the characteristics of several recent large embankment dam failures. They also describe the properties and failure conditions as well as embankment design considerations affecting these breaches and their relevance to the Jocassee Dam.

PAG0E 4

lI S in association with l*~C VALIDATION OF HRR BREACH HYDROGRAPH FOR.JOCASSEE DAM

8.0 CONCLUSION

S 8.1 Discuss Overall Conclusion The overall conclusion of this report is that the HRR breach hydrographs (Duke 2013), which was based on the original Xu and Zhang (2009) breach parameter regression equations, is a reasonable and conservative estimate of the downstream effects of a deterministic sunny-day breach of the Jocassee Dam. This conclusion is supported by our review of the data on which the Xu and Zhang (.2009) methodology is based, the confirmation of the assignment of a low erosion category to Jocassee Dam, and by comparisons with two additional breach hydrographs that are based on the Froehlich (1995a and 2008) regression equations and the revised Xu and Zhang regression equations in which the agency questions about the original Xu and Zhang (2009) methodology have been addressed. Both the revised Xu and Zhang and Froehlich (1995a and 2008) methodologies have been adjusted to allow for sufficient time to drain Lake Jocassee down to the breach bottom elevation (see Section 7.2)

The specific conclusions for this report are organized into two parts. In Section 8.2 we summarize our conclusions regarding our responses to the five agency questions. In Section 8.3 we summarize our conclusions from the review and revision of the Xu and Zhang (2009) methodology and the support that its application and an application of the adjusted Froehlich (1995b and 2008) methodology, to Jocassee Dam provide for the HRR breach hydrographs submitted to the NRC by Duke (2013).

8.2 Concluding Responses to Agency Questions

1) Precedence: Several uses of the Xu and Zhang (2009) ;methodology have been identified in addition to its application to Jocassee Dam. This new methodology seems to be following a pathway to broader acceptance in which its significant advantage over other methods by accounting for the important physical characteristic, Of erodibility is becoming recognized. The initial questions about the methodology are being addressed, including how to appropriately define and apply failure time estimates in dam breach modeling.
2) Chinese case histories: About 43% of the 75 dam failure case histories on which the Xu and Zhang (2009) methodology is based are for Chinese dams. Our review indicated that Xu and Zhang (2009) did appropriate screening and interpretation of the case history data from all sources, including China; although we identified a few improvements [see 2 in Section 8:3 belowj. The quality of data for the Chinese case histories appears to be similar to that available for US case histories with more recent breaches; although access to some of this data has been limited outside of China. The poorer construction of Chinese dams built prior to 1977 would be expected to, result in a more erodible dam once a breach process has initiated. This was appropriately P A GE 45

VALIDATION OF HRR BREA CM HYDROGRAPH FOR JOCASSEE DAM accounted for by assigning a higher erosion category in the Xu and Zhang (2009)

    • methodology.
3) Representation of case histories for rockfill and other low erodibility dams: The small number of case histories for rockfiUl dams that are classified with low erodibility is a reality that is likely due to the intrinsic safety of such rockfill dams. This limitation applies to all regression methodologies. However, the inclusion of the Briaud (2008) erosion categories as a control variabl e in the Xu and Zhang (2009) methodology provides a way to account for the important* influence of the erodibility of materials on breach parameters. Also, Xu and Zhang (2009) increased the number of case histories by including case histories from China for the Danghe and Gouhou large ro ckfilI dams.
4) Use of the Briaud erosion categories: Professor Briaud's independent review confirmed the following:

! Theappropriateness of using his erosion categories in the Xu and Zhang (2009) methodology.

  • The Xu and Zhang (2009) two-step procedure for assigning low, medium or high erosion categories to case history dams is consistent with' his research findings:

i) an initial categorization as a range based on the soil type within the dam as low to medium erodibility for rockfill and clay and medium to high erodibility for silt,

,and sand; and ii) an up or down adjustment in the initial range based on construction quality, particularly compaction effort, that, is dePendent mainly on the period of construction but also dam cross-sectional geometry and slope surface protection. In a few cases erosion categories were changed as summarized in 2 in Section 8.3 below.

  • The assignment of a low erosion category for Jocassee Dam was confirmed through a conservative analysis of the erosion rates for cross-section materials based on both velocity and shear stress.
5) Breach time definition: The definition of breach time used by Xu and Zhang (2009) includes both a part of the breach initiation process in addition to the breach formation process unlike other regression methods (e.g. Froehlich 1995b and 2008) that include only the latter. We found that this difference in definitions is of no concern as long as it is appropriately accounted for in using the predicted breach time in a way that is consistent with the HEC-RAS model definitions.

8.3 Concluding Support for the HRR Breach Hydrograph

1) Agency Concerns: Our review of the agency questions (summarized in Section 8.2) indicates support for the original application of Xu and Zhang (2009) tO estimate breach parameters on Which the HRR breach hydrographs are based; although some improvements to the Xu and. Zhang (2009) data base w ere identified [see 2) below]..

P AGE 46

SIn association with l*4C VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM

2) Revised Xu and Zhang regression equations sensitivity studies: The revised regression equations were developed by Dr. Xu based on the following changes and improvements to the XUi and Zhang (2009) data set:
  • Changed breach development times to the commonly-used Froehlich (1995b and 2008) definition. This change was seen as a way to predict the duration o~f the breach hydrograph in HEC-RAS; but, as summarized in 3) below, a broader issue with inconsistent "observed" breach times was found that required another step to obtain a reasonable predicted dur ation.
  • Changed the values of other breach param eters and control variables where they were inconsistent with the Wahl (1998) and FroehliCh (1995a and' b and 2008) data sets with consideration given to reliable information from other, sources.
  • Changed some assigned erosion categories to include the consideration that compaction associated with construction practices in the US and other developed.

countries (not China) improved for earthfill dams after about 1950 and for rockfiht dams after about 1965.

  • Changed to a higher erosion category where a lower category had been assigned because of long observed failure times but where all other available information pointed to the higher erosion category.

' Embankment dams with a core wall or concrete-faced dams that had been assigned to the low erosion category as a means of accounting for the throttling effects of these features on breach development were omitted from the revised data set because their breach parameters would not be representative of low erodibility embankment dams in general.

  • All Chinese case histories were omitted from the revised data set to avoid the potential criticism that we only had indirect access to the original references for these case histories.
3) InConsistencies between peak breach flows and breach development times: An inconsistency was identified for many case histories in the WahI (1998), Froehlich (1 995a and b and 2008), and XU and Zhang (2009) data sets. Specifically, the
'observed" breach development time is too short to discharge the reservoir contents above the breach bottom and match the "observed" peak breach flow rate. This inconsistency can be clearly seen in the Jocassee Dam breach hydrograph submitted to the NRC by Duke in support of the Safety Evaluation (E) Report (NRC 2011t) (Figure 7.4) that is based on using a breach formation time oti~b)(j(F .and median breach geometry parameter estimates~dFroehlich (1995a). The breach progression relationship reaches 100% aftetiI'jJ Iwhich implies that the breach .evelopment is cornplete at that time. However, the simulated breach flow rate is about 'j)7)F) /cfs at

[()7)(F) Jand therefore the breach size certainly would be growing quite rapidly. A more realistic simulation would require a longer breach development time that would produce a smaller peak breach outflow rate. To address this shortcoming .an adjustment was P AG6E 47

VAUIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM developed to obtain an estimate of the mean peak breach flow rate that is consistent with the mean breach formation time forea triangular breach hydrograph with a volume equal to the reservoir volume above the breach bottom (detailed in Section 6.2.8). This adjustment was also applied to the Froehlich (1995a and 2008) methodology to overcome the same shortcoming [see 5) below]. The adjustment relies on the relatively precise knowledge of the volume of the reservoir contents above the breach bottom elevation and the predicted values of the peak breach outflow rate, which of all the breach parameters have the highest R2 values for both the revised Xu and Zhang methodology (R2 = 81%) and the Froehlich (199 5a and 2008) methodology (R2 = 93%).

4) Application of Revised Xu and Zhang regression equations to Teton Dam: The revised best exact and best simplified Xu and Zhang equations were applied to the Teton Dam. The median predicted values for the high and medium erodibility categories were averaged, based On an evaluati on by Professor Briaud that Teton Dam erodibility is on the boundary between the high and medium erosion categories. The percent differences between the observed and predicted breach parameters were smaller for most breach parameters compared with those obtained using the original Xu and Zhang (2009) equations. An attempt to evaluate the adjustment procedure for accounting for the inconsistency in predicted breach time summarized in 3) above was found to be problematic because the observed breach time for the Teton Dam is uncharacteristically short due to an unusually sudden breaCh mechanism caused by the large internal void, which has been documented by the Bureau of Reclamation cause evaluation (Osmun 2013).
5) Sensitivity of the Jocassee HRR Breach Hydrograph based on Adjusted Revised Xu and Zhang Equations and Adjusted Froehlich (1995a and 2008): Considering the widths of the confidence intervals for both methods, both methods provide fairly similar median and mean estimates. Specifically with the adjusted revised best exact Xu and Zhang methodology, which uses the same breach formation time definition as Froehlich (1995b and 2008),1.and the adjusted Froehflch l995b an*0,*Bodology the mean breach formation time estimates arep I( l Jand I Ijrespectiveiy. By iteratively changing the orifice and weir coefficients and the breach progression relationship~ as rUn t.anr*Oxmtely match the mean peak breach flow rate estimates oli"j )W " cfs an* .. Ifs, for the two methodologies respectivelY.

The resulting breach hydrographs obtained by HDR forea deterministic piping failure of Jocassee Dam are similar to the HRR breach hydrograph (Duke 2013). It is therefore concluded that the use of the adjusted revised Xu and Zhang and the adjusted Froehlich (1995a and 2008) provide additional support for the conclusion in our February 2013 report (Ehasz and Bowles 2013) that the HRR breach hydrographs are realistic but cOnservative breach hydrographs that have good defendeblity based on the validity of the Xu and Zhang (2009) method, the conservative nature of the mnedian breach parameter a piping failure mode initiating in the [(,~

((7F)estimates, Iresulting in a breach developing in a single direction towards the center of the dam, the deposition of rockfill immediately below the dam, the low erosion category of the rockfill material, the p

P A GE 48v

VALIDATION OF HRR BREACH HYOROGRAPH FOR JOCASSEE DAM various characteristics of a modern dam that were included in the design and construction of Jocassee Dam and the time required to drain Lake Jocassee to the breach bottom elevation.

6) Sensitivity of the Jocassee HRR Breach Hydrograph to a Lower Breach Bottom Elevation: A sensitivity run was performed with the breach bottom elevation set to Elevation 800 feet msi. instead ,of Elevation 870 feet' msl., but with all the other breach parameters unchanged from the HRR breach hydrograph (Duke 2013). Even though this run was performed in a conservative manner, it was concluded that a lower breach bottom would not significantly changethe breach hydrograph.

P AG6E 49w

. . .. .. .. .. ..- - -n-l . .

-- ,dr VALIDATION OFHRR BRF.A C II YDROGRA PH FOR.JOCASSEE DAM

9.0 REFERENCES

Bureau of Reclamation. 1982. Guidelines for defining inundated areas downstream from Bureau of Reclamation dams. Reclamation Planning Instruction Rep. No. 82-11, U.S.

Dept. of the Interior, Bureau of Reclamation, Denver.

Bureau of Reclamation. 1988. Downstream hazard classification guidelines. ACER Tech.

Memorandum Rep. No. 11, U.S. Dept. of the Interior, Bureau of Reclamation, Denver.

Briaud, J. L. 2008. Case Histories in Soil and Rock Erosion: Woodrow WilsOn Bridge, Brazos River Meander, Normandy Cliffs, and New Orleans, Levees. Journal of Geotechnical and Geoenvironm ental Engineering, 134 (10): 1425-1447.

Briaud, J. L. 2013. Jocassee Dam. Report to URS. October 22. (Appendix A of this report)

Brunner, G.W. 2011. Hydraulic Model Development for Dam Break Studies. Hydrologic Engineering Center, U.S. Army Corps of Engineer~s. March.

Costa, J.E. 1985. Floods from Dam Failures. U.S Geological Survey Open File Report 85-560, Denver, Colorado. 54p, Duke Energy Company. 2013. Hydrologic Reevaluation Report submitted to the NRC on March 12, 2013.

Ehasz, J..L. and D.S. Bowles. 2013. Jocassee and Keowee Dams Breach Parameter Review.

Report for Duke Energy by URS Civil Construction & Mining and RAC Engineers &

Economists. February.

Evans, S. G. 1986. 'The maximum discharge~ of outburst floods caused by the breaching of man-made and natural dams. Canadian Geotechni cal Journal, 23(4) :385-387.

Fell, R., Wan, C.F., Cyganiewicz, J. and Foster, M. 2003. Time for Development of Internal Erosion arid Piping in Embankment Dams. Journal of Geotechnical and Geoenvironm ental Engineering, 129 (4):307-3 14.

Franca, M.J. and A.B. Almeida. 2002. Experimental tests on rockfill dam breaching procpss.

Proc. Intern. Syrup. on Hydraulic and Hydrological Aspects of Reliability and Safety Assessment of Hydraulic Structures, St. Petersburg, Russia.

P A 6E 50

uoL:zr...-:- ra..: ~fn~r~o

. /tf ' JInptJc cer- r N Y - -..... ---- --

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCASSEE DAM Froehlich, D.C. 1995a. .Embankment* dam breach parameters revisited. Proc., Water Resources Engineering, 1995 ASCE Conf. on Water Resources' Engineering, ASCE, NY, 887;-891.

Froehlich, DC. 1995b. Peak outflow from breached embankment dam. J. Water Resour.

Plann. Manage., 121(1):90--9 7.

Froehiich, D.C. 2008. Embankment Dam. Breach Parameters and Their Uncertainties. Journal of Hydraulic .Engineeding, 134(112):1 708-1721.

Haan, C.T. 1977. Statistical Methods in Hydrology. iowa State University Press.

HR Wallingford. 2012. AREBA (A Rapid Embankment Breach Assessment), Breach size -

rapid methods of assessment. http://www.hrwallingford.comlproiects/breach-size-rapid-methods-of-assesSment. Accessed January 26, 2014.

.HR Wallingford. 2014. Small Reservoirs Simplified Risk Assessment Methodology: Research Modelling Report. Final report to Defra and Environment. Agency Flood ,and Coastal Erosion Risk Management Research and .Development Programme, Project FD2658.

January.

MacDonald, T.C., and J. Langridge-Monopolis. 1984. Breachi~ng characteristics of dam failures. J5.Hydraul. Eng., 110(5):567-586.

Mohamed, M.A.A. 2002. Embankment breach formation and modelling methods. The Open Universit, England, UK.. April.

Nuclear Regulatory Commission (NRC). 2011. "Staff Assessment of Duke's Response. to Confirmatory Action Letter .Regarding Duke's Commitments to Address External Flooding Concerns at the Oconee Nuclear Station, Units. 1, 2, and .3 (ONS) (TAG Nos.

ME3065, ME3066, and ME3067)". January 28.

Osum, D. 2013. Teton Dam Failure:: A Review* of the Technical Factors Contributing to the Failure.. Presentation to the Ass ociation of Engineering Geologists. May.

Reclamation-USACE-URS-UNSW. 2008. Piping* and Seepage Toolbox.

Soil Conservation Service. 1981. Simplified dam-breach routing, procedure. U. S. Department of Agriculture, Technical Release 66, Washington,. D.C., 25 p. plus appendix.

Singh, VP. 1996. Dam breach modelling technology. Kluwer Academic, Boston.

P A GE 51-

VALIDATION OF HRR BREACH HYDROGRAPH FOR JOCA SSEE DAM Ru, N.H. and Y.G. Niu. 2001. Embankment dam - incidents and safety of large dams. Water Power Press, Beijing. [in Chinese.]

Sowers, G.F. 1987. Jocassee Main Dam Design, Construction and Performance. Report to Design Engineering Departm ent, Duke Power Company, Charlotte, North Carolina. April.

Von Thun, J.L., and D.R. Gillette. 1990. Guidance on breach parameters. Internal Memorandum, U.S. Dept. of the Interior,. Bureau of Reclamation, Denver.

Wahi, T. L. 1998. Prediction of Embankment Dam Breach Parameters - A Literature Review and Needs AssesSment. Dam Safety Report No. DSO-98-004, U.S. Department of the Interior, Bureau of Reclamation, Denver, Colorado.

Wahi, T.L. 2004. Uncertainty of Predictions of Embankment Dam Breach Parameters. ASCE Journal of Hydraulic Engineering, Vol. 130, No. 5, May 1.

Wahl, T.L. 2012. Several verbal discussions with J.L. Ehasz regarding the use of the Xu and Zhang (2009) technical paper as well as verbal discussions of erodibility factors as related to rockfill dams.

Wahl, T.L. 2013. Incorporating Breach Parameter Estimation and Physically-Based Dam Breach Modeling into Probabilistic Dam Failure Analysis. Presented at the NRC Interagency Workshop on Probabilistic Flood Haz ard Assessment. January 30.

Walder, J.S., and J.E. O'Connor. 1997. Methods for predicting peak discharge of floods caused by failure of natural and constructed earth dams. Water Resour. Res.,

33(10):2337-2348.

Wan, C.F., and R. Fell. 2004. Investigation of rate of erosion of soils in embankment dams. J.

Geotech. Geoenviron. Eng., 130(4):373 -380.

Xu, Y. and Zhang, L.M. 2009. Breaching Parameters for Earth and Rockfill Dams. Journal of Geotechnical and Geoenvironmental Engineering, 135( 12): 1957-1970.

Xu, Y. 2010. Analysis of Dam Failures and Diagnosis of Distresses for Dam Rehabilitation.

Ph.D. Thesis. The Hong Kong U niversity of Science and Technology. January.

PAGE 52"

...... r Appendices Jocassee Dam Validation of HRR Breach Hydrograph for Jocassee Dam

~,;aLp ~ ~ ;,Ipuuflp(;uu, - ~ ~ ~ IPJ i...rri £.QUU(UJ Appendix A Briaud's Report

Appendix A JOCASSEE DAM 17 January 2014 Report to UJRS Prepared by: Professor Jean-louis BRIAUDI PhD., PE 4

Fig. 1 - Jocassee Dam

1. MEETING LOGISTICS A meeting took place at the Jocassee Darn in South Carolina on 3 and 4 October 2013. The purpose of the meeting was to evaluate the erosion characteristics of the Jocassee Dam, which forms a large storage reservoir 12 miles upstream of Duke Energy's Oconee Nuclear Power Plant Complex near Salem, South Carolina.

The primary attendees were Dean Hubbard and Adam Johnson from Duke Energy; Chris Ey from HDR and Joe Ehasz from UR*S.

2. MEETING PURPOSE The primary purpose of the meeting and field trip was to become familiar with the Jocassee Dam and materials and address the following questions:
  • Is your (Briaud) work applicable to embankment dam erosion?
  • What is your (Briaud) characterization of Jocassee dam erosion characteristics?

PageA-I

Appendix A

  • Please comment on Xu and Zhang work on dam breach, and how the three erodibility classifications, used by Xu & Zhang, compare to your six classifications.

Important background details on soil erosion and rock erosion arc given in the Appendix.

3. IS YOUR (B3RIAUD) WORK APPICABLE TO EMBANKMENT EROSION?

The short answer is yes as long as the limitations listed below arc kept in mind; the work also has significant advantages also listed below. My work (B~riaud, 2008) is described in the background section of this report (Appendix). Of particular interest for Jocassee Dam are the charts shown below relating the critical velocity Ve to the mean grain size D50, the critical shear stress rc to the mean grain size D50, the erosion rate dz/dt to the velocity V, and the erosion rate dz/dt to the shear stress r. These charts are repeated below for convenience (Fig. 31, 32, 33, 34). These charts were developed on the basis of EFA testing (Appendix Section c, Fig. 5). This apparatus reproduces the erosion process at the element level where the water is flowing parallel to the interface. Thle charts were developed from hundreds of EFA tests on vastly different soil types over the last 20 years. The advantages and limitations of the applicability of these charts are listed below Limitationis:

a. The soils tested over the last 20 years were soils that could be sampled in a 3 inch diameter Shelby tube or re-compacted in a 3 inch Shelby tube to match the site condition.

The largest grain size that was tested was about 7 mm diameter gravel. For soils particles larger than that, the charts are based on published work by others including the US Arm)'

Corps of Engineers for example.

b. The Erosion Function Apparatus (EFA) reproduces a flow where the water is flowing parallel to the soil surface at the element level. Therefore using the EFA results for other flow conditions should be done with caution and with engineering judgment.

A dvan~tag~es:

a. The work is characterizing the behavior of the soil at the element level so it is broadly applicable to many erosion situations, including soil and rockfill materials used in embankment dams. The measured function called the erosion function is to erosion studies what the stress strain curve is to deformation problems. It is a constitutive equation which can be used in numerical method as easily as in simple hand calculations.
b. The wvork is very useful in the case of fine grained soils wvhere the erodibility is not related to the grain size.
c. The work includes the critical velocity or critical shear stress for coarse grained soils and rockfill based on an NCHRP project (Lagasse et al., 2006) which identified the USAGE equation as being the best among others. This equation is Eq. 8 in the Appendix for predicting the required size given a velocity. The critical velocity charts for large rock fill blocks have this solid background and are applicable to soil materials and rockfills used in embankment dams.
d. The EFA tests which form the basis for these charts has been used to predict several erosion processes in many materials. One example is the erosion that occurs in frnee grained and coarse grained soils around bridge supports as a function of time; Fig. 35 Page A-2

D*..L &.....l. v3 L.uww .....J.,i.I -- Ilull V :U i..V.. .. rn.inl ms * - - 3v n £urn

. A"p.. e..

.. A-

  • shows the precision obtained in this case. Other examples of applications include levee overtopping and meander migration in rivers.

INTACI RIP-RAP&

ROCK CLAY SILT [~~] ~ ~ ROCK

.~ I "t

/ US ARMY CORPS OF 100 FNGINEERS EM 1601 CRITICAI.

VELOCITY. 10 ea (m/s,) I 0A1 Vc=O" i(Dso)-02 V =0.351D*o)0 45 0.01 0.0001 0,001 0.01 0.1 1 10 I00 I000 10000 MEAN GRINA SIZE. D*0 (ra) JOINT SPACING FOR JOINTED ROCK

  • TMU 0mb ma vaoaebd Iy Iblaud. 4.4.. eta. 2be1, bada. PwNa. A.,awo*ababri o A1l 0~ mb

.pa.tab by bln*dk. 4.,4. (MU).m1o TodaS on-Nw Odlaain Lawn sa..*L dahd~ aumy, MWU., SLmit. WW ,wmetd yvnel .A.a. 17 Fig. 31 - Critical velocity as a function of mean grain size (Briaud, 2013).

__ ___ IUP-RAP &

L~QROC~j CLAY SILT ~ GRAVEL JOINTED ROCK 100000 US ARMY CORPS OF11 CRITICA*L SI-WAR STRESS, 100 2

(N/mn )

I01

-0.0S~(D)-4 5 BY SHIELDS (1936) 001 I

0010001 00O001! 1l 10I 100 1000 I0000 MFEAN GRAIN SlEP Ds (rm JOINT SPACING FOR JOINE ROCK e T~ltD Dab aa rapoanad by 5lel 4.4..L

.1.4. (MIS). -iabdaeab . Ma OAslm~~Law.

Sa Dab Dar Sa Camay. UAS.Wlb, bmt WW a. rapa~bd by Vanaud. V.A..ad. (1gr5).

.maulk~Matn Mae "da AWE aaNmmI.N. I* i oaa N. m pme.e, ABS.

Maw Vail..

Fig. 32 - Critical shear stress as a function of mean grain size (Briaud, 2013)

Pge A-3

  • li*

Inn i ii iIi *T iii v*Jw*w in iii iiii 1m v*f*w*

n iiii iiiii ... . .

EIfWi*Wll*d'q# .. -- .... .

vTtrw,wwwl* ...... iw*Jw IWm,mwwe* *0w*lnu0q*r*oi'eo*p*l

. ...

  • Iv *.. f* *l. .....

Appendix A Very High /Erodiblility High Eod~iblilty MedlIn Erodibility !1 n /,di- m san /knc Rolnl"

-N~-panSlt-Fin Cirvel Erodiblbty 1000-

-o.Platicity (2ih -Jomni Rock EROSION

-All ssrd 3-0mmSang RATE 100-(mmr/hr) co*41-igh Plasncuy> Very Low 10-Inc-r-aIe in at-/s-Jointed Rock rdbitVddol)

(cla) / *L/ (I+0-I500 mm" Spacng)

!- SP MLi ML H // -Euu"

/-L  % Rc -Jomt* ock V Lw 0.1 0.1 1.0 10 I00 VELOCITY (mis)

Fig. 33 - Proposed erosion categories for soils and rocks based on velocity (Iriaud, 2013).

100000 Very High High Erodibility Erodibility / Medium I0000 -I + Im ErudIbIlt

-o-pasclt Sit -Lov, PzAsticsr, Silt o*R/ LOW

  • , t~ *+-

3r'm ErodlbilIlty 1000-

-Htpf PlawuilyI* Silt~ o EROSION -I. Phiaan~ity Clla / -l0- nu0 Sp ciq)

- 1I1fistsur*l -Cobbles RATE '00 (mmn/hr) -Increase a C~ctio / -Hi* PlagiCti5 Very Low Erodibilty 10- SM (.,+. 'oiii 34Rc V

-increase ia Wme Non-Erosive MLii CL iCH/ ->, V!

0.1 0 I I0 100 10g0 10000 100000 SHEAR STRESS (Pa)

Fig. 34 - Proposed erosion categories for soils and rocks based on shear stress (Briaud, 2013).

Page A-4

Appendix A

  • =
  • Pier 3W

[- o Pier 4E

. 3 -* Pier 5E o0 Pier 23E

  • A Pier 24E

< r* A Pier 25E j v Pier 26E

=.1* 1

  • Pier 27E
  • 1,* Pier 28E

________________ _Pier_29E 0o1 2 3 4.

MEASURED LOCA L SCOUR DEPTH (in)

Fig.35 - Measured vs. predicted scour depth at Woodrow Wilson bridge (Briaud, 2008).

4. CHARACTERIZE JOCASSE DAM.

In order to evaluate the erosion function of the Jocassee Dam, the following process was used.

a. A cross section of the darn was drawn (Fig. 36).
b. An erosion category was chosen for each material wvithin the dam (Table 3); since the drawings specified that the D5 o was the minimum allowed, this selection is conservative.
c. Three erosion levels were placed across the dam as shown on Fig. 36: level AA, BB, and CC.
d. For each level, a weighted average of the erosion category was determined according to the length of material exposed to the flow for that level.

Z2:-1Li Where EC is the average erosion category, Li is the length of material i exposed to water, and ECi is the erosion category for material i.

e. Section AA gave an EC value of 3.93, section BB gave 4.08, and section CC gave 4.11.
f. Therefore, the overall average erosion category for Jocassee dam is clearly 4 or low erod ibi Iity.

Page A-5

L.tJpj~rU55.~, ~ ~ I5iJtIIi.~U(JlI - VliILIIIIUIU

....... j Appendix A Fig. 36- Cross section of Jocassee Dam..

Table 3 - Description of soil and rock materials in Jocassee Dam and erosion category Material Estimated critical velocity Erosion (Fig. 36) Description Category (mn/

b)(7)(F)

Rock fill Impervious core Random fill Filters A similar set of calculations were performed for the Teton dam. Fig. 37 shows the Teton Dam cross section and the three levels selected for calculating the weighted average erosion category for the Teton Dam. Table 4 shows the dam materials and their erosion categories. These erosion categories were estimated based upon the material description in Seed and Duncan (1981). The calculations indicate that the weighted average of the erosion category according to the length of material exposed for that level are: Section AA gave an EC value of 2.5, section BB gave 2.63, and section CC gave 2.7. The average erosion category of Teton dam is therefore estimated to be 2.6 or medium to high erodibility (Fig. 38).

If the Teton Dam failure took 4 hours4.62963e-5 days <br />0.00111 hours <br />6.613757e-6 weeks <br />1.522e-6 months <br /> for an erosion category of 2.6 (medium to high erodibility), and considering that the erosion categories are based on a log scale, it is clear that a Jocassee Dam failure which has an erosion category of 4 (low erodibility) would take much longer.

Page A-6

~.Uf1EWUfl5 ~U Univ .ZWFFUUVW UJUILiY UEIWI5LWI - WE5lwI~~a ,, wg. .....~,fl.. .AL........~ - -- IC OfT? fl.iflOidi A.. ..... i A -

SC~E 30011 20011 1001 0*

Mink WS E E334 *- c-A A.

  • m --

El 5232 lh B

IA.5132 JO Fig. 37 - Cross section of Teton Dam.

Table 3 -Description of soil and rock materials in Teton Dinm and erosion category Material (Fig. Description Estimated critical velocity Erosion

37) ______________(m/s) Category Zone I (Core) Silt with some clay, sand, and 0.2 2 gravel ___________________

Zone 2 Selected sand, gravel and 1 3.1!

_____________ cobbles ___________________

Zone 3 Miscellaneous fill 0.5? 2.5 Zone 4 Selected silt, sand, gravel, and 0.8 3 cobbles ___________________

Zone 5 Rockfiil 2 4 TETON DAMi 10O0W Ver Hgh Erdbiiy ig Erodibilhty Medium Ero~dtbilhty J(OCASSEE D)ANIp 10000 Er-diblhity II EROSION ,.S/.,... io i*

RATE 100 -- .. ,,

(mm/br) -iii*** '" ,* -* Very Low NI LI Rock\ .*,***,,V 0.1(1 0.1 1.0 10 lOS VELOCITY (mis)

Fig. 38 - Overall erosion category for Jocassee and Teton Dams (velocity based).

PageA-7

.................................................................. m_.__

...... r" ..... A....... A~

TETON flAM

  • HI1gb .i(WASEE FEud IlbUily Medium I)AM neoooo ~ ,fol,* t II Erediblity III IA IOO E EROSION I I.~t. P1441b ~III .,,~d H, V

RATE 100 - Uae 1.'.. PIs.'~.#' 4 U, '~ %f4fl~~

(mm/br) * 'u" Very Low

~ ~ U 4 441 FrodIbIIity SP

/

NILJ C

~ nfl Nom-Erosi, C' 0.1 Rock *Iq ~ VI Ira fl*

0 1 10 100 100 I000 I000 SHEAR STRESS (Pa)

Figl. 39 - Overall erosion category for Jocassee and Teton Dams (shear stress based).

S. COMMENT ON THE CHOICE OF ERODIBILITY OF XU AND ZHANG and HOW THE ThREE ERODIBILITY CLASSIFICATIONS, USED BY XU & ZHANG, COMPARE TO YOUR SIX CLASSIFICATIONS?.

The work done by Xu and Zhang is very useful as it is based on a database of observations. Since the authors point out that erodibility is the single most important factor, it is critical to understand how they defined the erodibility of the materials making up the dam. The three erodibility classifications used by Xu & Zhang (2009) refer to low, medium, and high erodibility.

From their publication, it appears that these three category designations correspond to the low (category 4), medium (category 3), and high (category 2) categories proposed by Briaud (2008).

This was verified with the primary author (Yao Xu) durng his visit to Denver, CO in November 2013. The categorization reflects the fact that the types of materials typically used for the construction of earth damns fall into the Briaud erosion categories 2, 3, and 4 with some category 5 materials for rockfill dams. Indeed fine sands and non-plastic silts (Briaud category 1) and jointed and intact rock (Briaud category 6) are not used in eatdam engineering.

6. CONCLUSIONS
  • The erosion function characterizes the behavior of the soil at the element level so it is broadly applicable to many erosion situations including erosion of materials used in embankment dam construction. The erosion function is the curve which links the erosion rate to the water velocity or the hydraulic shear stress at the soil-water interface; it is to erosion studies what the stress strain curve is to deformation problems. It is a constitutive Page A-8

Append ix A equation wvhich applies to the erosion mechanics of all materials including the materials used in embankment dams and can be applied in numerical methods as easily as in simple hand calculations.

  • The erosion function starts at the critical velocity or critical shear stress for coarse grained soils and rock fill. The rockfill values are based on an NCH-RP project which identified the USAGE equation as being the best among others. This equation is Eq. 8 in the Appendix which gives the particle size corresponding to a giv'en critical velocity. So the basis of the critical velocity charts for large rock fill blocks has this solid background and therefore applies to embankment dam materials.
  • The erodibility of the Jocassee Dam materials was evaluated; see Figures 38 & 39, and the Jocassee cross-section materials are clearly and conservatively established to be "low erodibility" materials.
  • The Xu and Zhang regression equations do showv and consider that erodibility is the most significant factor in the development of embankment breach parameters. Thus, it is most important, in evaluating their equations, to establish how Xu and Zhang have assigned the "low, medium or high" erodibility to the various dams and data to establish their regression equations. Use of the three classifications is appropriate since they do represent the characteristics of the most commonly used materials for construction of embankment dams.
7. OPTIONS FOR FURTHER STUDY The following options for fuirther study can be pursued to refine the specific erodibility characteristics of the dam materials, and the time necessary to erode Jocassee dam.
a. Nuimerical simulations. The program CHEN 4D can be used to simulate the breach in 4 dimensions (x, y, z, t) together with the erosion functions of the various materials. This will give a much more precise time to total erosion than HEC-RAS which is a one dimensional solution of the problem. Professor Chen and I can team up for simulating the water flow and the soil erosion. Such dam breach simulations are possible as shown on Fig. 40 below. The results would be a movie with timed frames of the darn erosion as a function of time with associated erosion versus time curves. Note that two distinct modes of failure need to be simulated: piping erosion followed by breach as the roof of the dam embankment collapses (e.g.: Teton) and overtopping erosion and breach erosion starting at the bottom of the dam downstream face where the velocity is maximum (e.g.: Hell Hole). The first failure mode will be referred to as "'piping" wvhile the second one will be referred to as "overtopping".
b. Calibration based on previous failures (e.tg.: Teton and Hell Hole). The numerical simulation must first be calibrated against the failure of known dams. CHEN 4D should Page A-9

f Appendix A be used to duplicate the erosion process vs. time for the piping failures (e.g.: Teton Damn) and for the overtopping failures (e.g.: Hell Hole).

c. Erosion function for selected dams. In order to directly measure the erodibility of the dam material, tube samples of the damn can be collected (e.g. Teton and Hell Hole) and run in the EFA. This would require visits to the dam sites. Samples of the finer materials can be taken by hand driving short thn wall steel tubes in the remaining part of the Teton Dam. Rockfill from Hell Hole could also be collected and tested as explained next.
d. Erosion function for Jocassee rockfill. In order to directly measure the critical velocity of the Jocassee Dam rockfili, flume tests can be carried out with rockfill material with a D50 matching the one from the dam. This can be done in a large laboratory flume at Texas A&M University where such a flume exists. Rockfill from the Hell Hole reconstruction site could also be tested in that fashion.

Fig. 44) - Example of advanced numerical modeling of interaction between water flow and a structure (Zhao, Chen, 2013).

Page A-IO

Appendix A REFE REN CES

1. Briaud J.-L., 2008, "Case Histories in Soil and Rock Erosion: Woodrow Wilson Bridge, Brazos River Meander, Normandy Cliffs, and New Orleans Levees", The 9th Ralph B.

Peck Lecture. Journalof Geotechnicaland Geoe~n'ironmentalEngineering.Vol 134.

No. 10, ASCE, Reston Virginia,. USA.

2. Briaud J.-L., 2013. "GeotechnicalEngineering: UnsaturatedandSaturatedSoils". John Wiley and Sons Publisher, 1000 pages.
3. Lagasse P.F., Clopper P.E., Zevenbergen L.W., Ruffi.F., 2006, "Riprap Design Criteria, Recommended Specifications, and Quality Control", IVCHRP report 568. National Cooperative Highway Research Program of the Transportation Research Board, Washington DC, USA, pp226.
4. Seed, 1-LB., and Duncan, J.M., (1981), "The Teton Dam Failure - A Retrospective Review", Proceedings of l Oth InternationalConference on Soil Mechanics and FoundationEngineering, Stockholm, Vol. 4, pp. 2 19-238.
5. Xu Y., Zhang L.M., 2009, "Breaching Paramneters for Earth and Rockfill Dams", Journal

.ofGeotechnicaland GeoenvironrnentalEngineering. Vol. 135, No. 12, ASCE, Reston Virginia, USA.

6. Zhao Y., Chen H.-C., (2013), "CFD Simulation of Violent Free Surface Flows by a Coupled Level-set and Volume-of-Fluid Method", Proceeding'sof the 2013 1SOPE Conference. Anchorage, Alaska, USA.

Page A-11

Appendix A APPENDIX BACKGROUND ON EROSION

a. The erosion phenomenon An erosion problem always has three components: the soil or rock, the water, and the geometry of the obstacle that the water is encountering. The resistance of the soil or rock is characterized by its erodibility, the water action is quantified by its velocity, and the geometry of the obstacle by its dimensions. Fig. 3 shows a free body diagram of a soil particle, a cluster of particles, or a rock block at the bottom of a lake. The water imposes ,a normal stress (hydrostatic pressure) around the soil particle or rock block. The normal stress is slightly higher at the bottom than at the top since the bottom is slightly deeper in the water column. This normal stress difference creates the buoyancy force which reduces the weight of the soil particle or rock block. Fig. 4 shows the same particle, cluster of particles, or rock block at the bottom of a flowing river. Three things happen when the water starts flowing. First, a drag force and associated shear stresses develop at the interface between the soil particle or rock block and the water flowing over it.

Second, thde normal stress on top of the soil particle or rock block decreases because of the water flow. Indeed, as the velocity increases around the particle or the obstacle, the pressure drops to maintain conservation of energy according to Bernoulli's principle. This phenomenon is similar to the air flow on top of an airplane wing where the pressure is lower than below the wing thereby developing the uplift force necessary for the plane to fly. Third the normal stresses and shear stresses applied at the boundaries are fluctuating with time because of the turbulence in the water. These fluctuations find their roots in the appearance and disappearance of eddies, vortices, ejections, and sweeps in the flowing water; they can contribute significantly to the erosion process especially at higher velocities. In some cases they are the main reason for erosion. The contribution of turbulence fluctuations to the erosion process has been studied by several authors as reported by Briaud :2013. The combination of the mean value and the fluctuations around the mean of the drag force and uplift force can become large enough to pluck and drag the soil particle, soil particle cluster, or rock block away and generate erosion.

Note that in the case of unsaturated soils or saturated soils with water tension, the mechanical inter-particle compressive forces (fc1 in Fig. 3 and 4) can be significantly larger than in the case where the water is in compression. This apparent cohesion may increase the resistance to erosion at least until the flow and presence of water destroys the water tension.

Page A-12

1

&1P.WL, 4 1 V...,w*e* C.,..2t* L.*e ¶vr.:Wa2 --- rh i

..... .. l~ ... j~ r-.........

.. 9 tfl .j AppendixA

-- ~ V 2 m Vymo f.. -, ,me,etrtcal foce bee pa)rtic~le.

1., - forces at co.~cts bewe psyticlee co = center of gravity W - weight of pertilel wat,

- ver pri er aroun peii@.

Fig. 3 - Free body diagram of soil particle or rock block for no flow (Briand, 2013) vx 4'v, +

U-1t, -elctica forces bewe perusclee f - foce at coet between perficies W - we4ight of pe~rtcl*e u, -, wetr pressure around particle

- shea~lr stes arond particle.

Fig. 4 - Free body diagram of soil particle or rock block when water flows (Briaud, 2013)

Page A-13

Appendix A

b. Erosion models The erodibility of a soil or rock can be defined as the relationship between the erosion rate z and the velocity of the water v near the soil-water interface. This definition is not very satisfactory because the velocity varies in direction and intensity in the flow field. In fact, strictly speaking, the water velocity is zero at the soil/rock-water interface. A more satisfactory definition is the relationship between the erosion rate z and the shear stress r at the soil/rock-water interface.

= f(rt) ez (1)

The erosion function described by Eq. 1 represents the constitutive law of the soil or rock for erosion problems much like a stress strain curve would represent the constitutive law of the soil or rock for a settlement problem. While a shear stresS based definition is an improved definition over a velocity based definition, it is still not completely satisfactory as the shear stress is not the only stress which contributes to the erosion rate. A more complete description of the erosion function is given by Eq. 2:

____Ar ~(2)

Where z is the erosion rate (mis), u the water velocity (m/s), "t the hydraulic shear stress, r* the threshold or critical shear stress below which no erosion occurs, p the mass density of water (kg/in 3 ), AT the turbulent fluctuation of the hydraulic shear stress, and Act the turbulent fluctuation of the net uplift normal stress. All other quantities are parameters characterizing the soil being eroded. While this model is quite thorough, it is rather impractical at this time to determine the 6 parameters needed in Eq. 2 on a site specific and routine basis. Today Eq. 3 which corresponds to the first term of Eq. 2 is widely accepted.

z - = (3) u t,,oU)

As additional fundamental work is performed in erosion engineering, it is likely that Eq. 3 will evolve towards Eq. 2.

c. Measuring the erosion function An apparatus was developed in the early 1990s to measure the erosion function. It is called the Erosion Function Apparatus or EFA. The principle is to go to the site where erosion is being investigated, collect, samples within the depth of concern, bring them back to the laboratory and test them in the EFA. A 75 mm outside diameter sampling tube containing the sample is placed through the bottom of the conduit where water flowvs at a constant velocity (Fig. 5). The soil or rock is pushed out of the sampling tube only as fast as it is eroded by the water flowing over it.

For each velocity, an erosion rate is measured and a shear stress is calculated using Moody's 1944 chart (Briaud 2013). Point by point the erosion function is obtained.

Page A-14

Appendix A WATER FLOW v*- j a I

PISTON SpOIL (mm/hr) PSHING AT RATE Z t(N/rn2 )

Fig. 5 - Erosion Function Apparatus to measure erodibiity.

Examples of erosion functions are shown in Fig. 6 for a fine sand and Fig. 7 for a low plasticity clay. Note that for the same average velocity of 1 m/s in the EFA test conduit, the rate of erosion for the sand is about 1000 times faster than for the clay. This indicates that the rate of erosion can be very different for different soils. Other devices have been developed to evaluate how resistant earth materials are to water flow. These include the rotating cylinder to measure the erosion properties of stiff soils, the jet test to evaluate the erodibility of soils, and the hole erosion test to measure the erosion properties of stiff soils. More recently a simple and inexpensive tool for field use has been developed called the pocket erodometer. It can be performed at the site on the end of a sample and gives a first indication of the erodibility of the soil within minutes after sampling.

10000 10000 0

  • 1000
  • m 10)0 0 S

10 0

0 0.01

  • 0.01 0 0.11 0.1 1 10 100 Veolcity (m/s) 10 100 Shear Stress (N/mn2 )

Fig. 6 - Erosion function for a fine sand as measured in the EFA.

Page A-15

L-,UfldiI.ll, *Ui.Uf 1.*)[ I*I[J*ilV* *iaiIaIaIUIIQUI - VVILIIIIIJIU Iujlli pULUI1I Ul *I,MU.U IJG iu utlI*&..U Appendix A 0O0lO

. h" 0 0 0

-0 "

o 0 0.1 1 10 100 0..1 1 10 100 Velocity (mis) Shear Stress (N/lm 2 )

Fig. 7 - Erosion function for a low plasticity clay as measured in the EFA.

d. Soil erosion categories Categories are used in many fields of" engineering: soil classification categories, hurricane strength categories, earthquake magnitude categories. Such categories have the advantage of quoting one number to represent a more complex condition. Erosion categories are proposed (Fig. 8) in order to bring erodibility down in complexity from an erosion rate vs. shear stress function to a category number. Such a classification system can be presented in terms of velocity (Fig. 8) or shear stress (Fig. 9). The categories proposed are based on 15 years of erosion testing experience, in order to classify a soil or rock, the erosion function is plotted on the category chart and the erodibility category number for the material tested is the number for the zone in which the erosion function fits. Note that, as discussed later, using the water velocity is less representative and leads to more uncertainties than using the shear stress; indeed the velocity and the shear stress are not linked by a constant. The velocity chart has the advantage that it is easier to gage a problem in terms of velocity.

One of the most important soil parameters in erosion studies is the threshold of erosion. Below this threshold, erosion does not occur and above this threshold, erosion occurs. In terms of shear stress, this threshold is the critical shear stress rc and in terms of` velocity, it is the critical velocity vc. Fig. 11 shows a plot of the critical velocity as a function of the mean grain size while Fig. 12 shows the same plot for the critical shear stress. The data come from measurements in the EPA as well as measurements published in the literature. As can be seen on Fig. 11 and 12, the relationship between the critical value and the grain size has a V shape indicating that the most erodible soils are fine sands with a mean grain size in the range of"0.1 to 0.5 mam. This V shape also points out that particle size controls the erosion threshold of coarse grained soils while particle size does not correlate with the erosion threshold of fine grained soils. Shields in 1936 proposed a curve for coarse grain soils in his doctoral wvork which is included in Fig. 11 and 12.

Shields recommendations do not include fine grain soils. Note also that Hjulstrom in 1935 proposed such a curve for both coarse grain soils and fine grain soils but his recommendations for fine grain soils turned out to be too simple.

Page A-16

Appndix A

/ High Medium Eludibility; II ~~

/ -Meiu Sand Jot e 1e000 -Fne Sand Low Pl~aiuot SilF i$pacmg: 30 im* // LOW

/Nnpa~cSl Ffl G'*PryaCvel o EROSION RATE 100- -- Lo' .laau paiC/ Rck 'Very Low (mm/hr) - ncrease/n COgjmCdibmty~

10- SM - inces l /-JnnedRok

- Inry7 (M n (~i*500 mul Spacing)

ML MH /PrHP

/! CL CH Rock vI 1w 0.1!

0.1 1.0 10 100 VELOCITY (mis)

Fig. 8 - Proposed erosion categories for soils and rocks based on velocity.

1O00000 10000 1000 EROSION RATE 100o (mm/br) 10 0.1 0 1 0 100 100 10000 100000 SHEAR STRESS (Pa)

Fig. 9 - Proposed erosion categories for soils and rocks based on shear stress.

Page A-17

Appendi A CLAYSIL SAN GRAVL JOINToED RocK 1000 100 CRITICAL VELOCITY, 10 (rn/s.) I 0.1 0.01 t-0.0001 0.001 0.01 0.1 1 10 100 1000 10000 MEAN GRAIN SIZE, Dso (rm JOINT SPACING FOR JOINTED ROCK mt P,..gtae.d ,A t.w*inem~. wl. A. ¶37eUW.41L*

Mew Vew.

Fig. 11 - Critical velocity as a function of mesa grain size.

P

  • r ~RIP.RAP*&

IN[TACT1 RoC AY SILT CR1IFICAI.

SIIEAR STRESS, ;:

(N/rn2 )

0.0001 0.001 0.01 0.1 1 10 100 1000 10000 MEAN GRAIN SIZE, D~o (mam) JOINT SPACING FOR JOINTED ROCK

  • T1M Game. ...
  • by leudl .L,.L et R.
  • fl (3,i.. "lk~m ,~e., A*pmuabsf M ew Raw*" 0r.m.A . e* md*

0.eq.*. t. .171) eI Fig. 12 - Critical shear stress as a function of mean grain size Page A-i8

Appendix A The erodibility of soils varies significantly from one soil to the next; therefore erodibility depends on the soil properties. It depends also on the properties of the water flowing over the soil. For some soils, particularly dispersive soils, the higher the salt concentration in the water, the more erosion resistant a clay is. The properties influencing erodibility are numerous; some of them are listed in Table 1. It appears reasonable to expect that a relationship would exist between common soil properties and erodibility. But erodibility is a function not a number therefore correlations can only be made with elements of that function such as the critical shear stress or the initial slope of the erosion function. Such correlations have been attempted and failed with very low coefficients of correlation. On one hand, there should be a correlation, on the other hand, the correlation is complex and requires multiple parameters all involved in the resistance of the soil to erosion. All in all it is preferable to measure the erosion function directly in an apparatus such as the EFA.

Table 1 - Soil and water properties influencing erodibility Soil water content Soil clay minerals Soildispersion ratio Soil unit weight Si ainecag a Soil plasticity index Soil catondexchaboping cap Soil undrained shear str. Si oimasrto a Soil void rt-io Soil pH Soil swell Soil temperature Soil mean grain size Water temperature Soil percent passing #200 Water salinity Water pH

e. Rock erosion If soil erosion is not very well known, rock erosion is even less known and the engineer must exercise a great deal of engineering judgment when it comes to rock erosion. Nevertheless many engineers and researchers have contributed to the advancement of knowledge in this relatively new field.

Rock erodes through two main processes: rock substance erosion and rock mass erosion. Rock substance erosion refers to the erosion of the rock material itself while rock mass erosion refers to the removal of rock blocks from the jointed rock mass. Rock substance erosion includes three sub-mechanisms: erosion due to the hydraulic shear stress created by the water at the rock-water interface, erosion due to abrasion caused by sediments rubbing against the rock during the flow, and impact of air bubbles that pit the rock surface due to cavitation at very high velocities. Rock mass erosion includes two sub mechanisms: erosion due to slaking, and erosion due to block removal between joints. Slaking can occur when a rock, such as a high plasticity shale in an ephemeral stream, dries out and cracks during summer months; these small blocks are then removed by the next big flood. Block removal can occur if, during high turbulence events, the difference in pressure between the top and the bottom of a rock block becomes large enough to overcome the weight and side friction on the block. Brittle fracture and fatigue failure can contribute breaking the rock into smaller pieces which then are carried away by the water. Note that most of the time, rock mass erosion will be the dominant process in rock erosion with only Page A-19

- ~

Appendix A rare occurrences of rock substance erosion.

The critical velocity associated with rock erosion is much higher than the critical velocity associated with soil erosion in general. At the same time, the erosion rate for a given velocity is much lower for rock erosion than for soil erosion in general. Table 2 is an attempt at quantify hag the critical velocity and the erosion rate of jointed rocks where the rock mass erosion may control the process. This table is preliminary in nature and should be calibrated against field behavior. The critical velocities quoted in Table 2 refer to the velocity necessary to move a particle with a size equal to thle spacing between joints; as such they are likely lower bounds since they ignore any beneficial effect from the shear strength of the joints. Note that the orientation of the bedding of the rock mass is important as shown on Fig. 13. Engineering judgment must be used to increase or decrease the critical velocity when the bedding is favorable or unfavorable to the erosion resistance. in addition, it is highly recommended in all cases to measure the erosion function of the rock substance on core samples obtained from the site.

Table 2 - Rock mass erosion; this table is preliminary in nature and should be calibrated against field behavior.

Joint Critical.O tt Spacing Velocity Caerosy ofonnt (mm) (m/s) Caeoy oons

<30 0.-1.35 Category Ill

<30 0.-135 Medium"~ Not applicable 30-150 1.35-3.5 Category IV Evaluation needed

________ ___ ___ __ Low 150 - 1500 3.5-10 Category V Evaluation needed

________Very Low

>150 >10 Category VI

>__1500_ >____

10 _ Non-Erosive Not applicable FAVORABLE UNFAVORABLE ORIENTATION ORIENTATION FLO DRECTION FLO.W DIRECTION" Fig. 13 - Effect of joint orientation on erosion resistance.

Examples of rock erosion rates can be collected from geology. For example, the Niagara Falls started about 12000 years ago on the shores of Lake Erie and have eroded back primarily through undercutting of the falls rock face to half way between Lake Erie and Lake Ontario. This represents 11I km and an average rate of 0.1 mm/hr, through sandstones, shales and l imestones sedimentary rocks. Another example' is the Grand Canyon where the Colorado River has Page A-20

- Appendi A generated 1600 m of vertical erosion through complex rock layers over an estimated 10 million years for an average rate of 0.00002 mm/hr as the Colorado Plateau was up-heaving. These rates appear negligible at first glance yet neglecting them would be neglecting the Grand Canyon or the rera of Niagara Falls. The lesson is clear: it is not only the rate of erosion which is important but also the length of tine over which that rate is being applied.

f. Water velocity Fig. 14 shows the profile of water velocity as a function of flow depth. The water velocity is largest near the top of the water column and zero at the bottom. This has been measured repeatedly in hydraulic engineering. By comparison, the shear stress is highest at the bottom and near zero at the top of the water column. The relationship between the shear stress and the velocity can be established as follows. Because water is a Newtonian fluid, there is a linear relationship between the shear stress 'r and the shear strain rate d'y/dt.

C:-Y- (4)

Where jt is the dynamic viscosity of the water (10. Pa.s at 200 C). This viscosity is different from the kinematic viscosity v of water (10"+ m2/s at 200 C) defined as v jj/p where p is the mass density of water (1000 kg/in 3 ). Since, as shown on Fig. 14, y is du/dz, then dy,/dt is dv/dz where v and u are the water velocity called shear velocity and horizontal displacement in the horizontal direction at a depth z respectively. Then the shear stress r at depth z is given by:

Therefore the shear stress is proportional to the gradient of the shear velocity profile with flow depth and the shear stress at the soil/rock-water interface is the slope of the profile at the interface. If the slope of the water velocity profile at the water-soil or water-rock interface (interface shear stress) is kept constant and if the water depth is varied, then it can be shown that the mean depth velocity will vary as well. This implies that there is no constant ratio between mean depth velocity and interface shear stress. This is one reason why velocity alone is not as good a predictor of erosion as shear stress. As such, any erosion design tool presented in terms of velocity should be used with caution. On the other hand, velocity is much easier for the engineer to gage than shear stress, and this is why both velocity and shear stress are used in practice.

Fig. 14 - Velocity and shear stress profile versus flow depth Page A-21

Appendix A The magnitude of these shear stresses is very small and measured in N/rn 2 . They are much smaller than the shear stresses that the geotechnical engineer is used to calculate in foundation engineering for example which are in the range of kN/m'. Fig. 15 gives examples of the range of shear stresses associated with various fields of engineering, If the undrained shear strength is a reasonable measure of the strength of a clay for foundation engineering design, the critical shear stress is the "shear strength" of the same clay for erosion studies. The difference in magnitude of the stresses and the strengths for foundation engineering and erosion is that in erosion studies one looks at the resistance of one particle, or a small cluster of particles, while in foundation engineering one looks at the resistance of the soil mass at the foundation scale.

Vnnder Waals Guolochnicnl Forceeo Shoat Stronglh Weight of of Soill One Soil Gralil Soft .-

  • V. Hord 1 o = 01 ^WolL Depth 100 T*M*T/

(in) 10-2 Soil Shear Stress Involved (Himn2 )

Fig. 15 - Range of shear stresses encountered in different engineering fields.

The water does not flow at a constant velocity in a river and the velocity history over a period of time is a necessary input to many erosion problems. This velocity history or hydrograph is not usually readily available. Often, the discharge (ma/s) hydrograph is available and needs to be transformed into a velocity (mis) hydrograph and a water depth (in) hydrograph. This is commonly done by using software such as HEC-RAS. An example of the results of this transformation is shown in Fig. 16. HEC-RAS solves the one-dimensional energy equation for gradually varied flow in natural or constructed channels and adds the one-dimensional momentum equation around hydraulic structures such as bridges, culverts, and weirs where the energy equation is no longer applicable.

Page A-22

C7;:.:2=::_.2.:." "Z..:JL':. -:_ :;%..~..... ..... ~~ir...

L Lu,m.. ,.;,. ..... ;n* c,- .....

Appendix A 12000 10000

-S 8000 Q 6000 4000 rQ 2000 0

1960 iii Lihk.Ai&LAL~iLL 4iLk 1970 1980 1990 1998 TiME (yrs) 3 S.-

2 1

0 0

1960 1970 1980 1990 1998 TIME (yrs)

TIME (yrs)

Fig. 16 - Discharge, velocity, and water depth hydrographs The hydrograph can be used to obtain the 100 year flood or the 500 year flood. One simple graphical method consists of obtaining the yearly maximum flows from the hydrograph, ranking thenm in descending order of intensity, calculating for each flow the probability of exceedance as the rank divided by the total number of observations + 1, then plotting the flow versus the probability of exceedance on a semi-log paper such as the one of Fig. 17. Once the data is plotted, a linear regression is performed over say the first 20 to 30 years of data and extrapolated to the 0.01 probability of exceedance for the 100 year flood and to the 0.002 probability of exceedance for the 500 year flood. Indeed the return period is the inverse of the probability of exceedanice. There are other and more refined ways of obtaining these design floods but this simple graphical method helps understand the process and the meaning of the 100 year flood: a flood which has a 1% chance of being exceeded in any one year. Fig. 17 shows the result of an analysis for the hydrograph at the Woodrow Wilson bridge. As can be seen on that figure, the 100 year flood has a discharge of 12,600 m3 /s and thc 500 year flood has a value of 16,600 m3/s.

Page A-23

~2~taI~  :-ft- ~-~sm~r, !~srrnsW..-~ 1~rhs5d n-su ~~u; v:;r..~. - 10 cm LNO:i Appendix A FLOOD-FREQUENCY CURVE BASED ON ORIGINAL HYDROGRAPH (1931-1999) y -2491O6y(xr262 lod 12629n9/s:++t lO0(* S*g-AMFLOW (m J/s)

?p ! + +?... +*: -++ ..lo..

SO......

r-+*.

? p+-+:-+y+-,ca 16639m.3.+s .

0 100 10 1 0.1 PERCENT PROBABILITY OF EXCEEDANCE IN ANY ONE YEAR (%)

Fig. 17 - Flood frequency curve obtained from measured discharge hydrograph.

The probability of exceedance R of the design flood with a given return period T1 depends on the design life l~ of a structure.

am 1 _(1 l /Tr)Ut (6) if the design life of the bridge is 75 years, the probability that the flood with a return period of 100 year will be exceeded during the 75 year design life is 53% according to Eq. 6 and that probability is 14% for the 500 year flood. Only when one gets to the 10,000 year flood does the probability get to be lower than 1%(0.75%). Therefore looking at those numbers alone, it seems desirable to use the 10,000 year flood for design purposes. This flood is used in design in the Netherlands for regions of the country deemed critical. The USA uses the 100 and 500 year flood for design purposes in hydraulic engineering; this leads to probabilities of exceedance which are in the tens of percent. By comparison, the structural engineers use a probability of exceedance of about 0.1% for the design of bridge beams (LRFD target) and, judging from measured vs.

predicted pile capacity data bases the geotechnical engineer uses a probability of exceedance of the order of a few percent. While these numbers can be debated, it is relatively clear that these different fields of civil engineering operate at vastly different probability of exceedance levels.

Note that risk is different from the probability of exceedance as it also involves the value of the consequence. As such, the probability of exceedance target should vary with the consequence of the failure.

g. Geometry of the obstacle The geometry of the obstacle encountered by the water influences the velocity of the water and the flow pattern including turbulence intensity. When the water approaches a pier in a river for example it has to go around the pier. In doing so it faces a restricted area and has to accelerate to maintain the flow rate. This acceleration results in a local mean depth velocity which can be 1.5 Page A-24

Appendix A times higher than the approach mean depth velocity. If the approach velocity is lower than the critical velocity but the local velocity around the pier reaches a value higher than the critical velocity, then scour occurs around the pier. This scour type is called clear water scour that is to say scour created by water which does not carry soil particles. On the other hand, if the approach velocity and the velocity around the pier are both higher than critical, then the scour type is live bed scour. This means that the water is carrying a significant amount of soil particles. The scour depth reached under live bed scour conditions is typically less than the scour depth reached under clear water scour conditions. The reason is that during live bed scour some of the particles in suspension fall down on the river bed thereby limiting the depth of the scour hole around the pier.

Fig. 18 a and b show results of numerical simulations of erosion created by water flow in a contracted channel. The CHEN 4D computer program is the program used.

(a) Scour depth and shear stress distributions at t - 2000 min shear stress distributions at t - 15000 min Fig. 18 - Predicted scour hole shape and streambed shear stresses around abutments and piers: (a) t =2000 rain, (b) t =15000 win (From Chen, 2002)

Page A-25

Appendix A Ii. Background on levee overtopping This background is given here because it is related to the topic of dam erosion. Levees are small homogeneous damns which only retain water fr'om time to time as opposed to damns which are typically larger and retain water all the time. Nevertheless, this previous wvork carries some resemblance. Levees or dikes are small dams build along a river or.an ocean to prevent the water from inundating the land in case of flood. The top of the levee is set at a predetermined height corresponding to the water level for a chosen design flood. This flood corresponds to a certain*

return period such as a 100 year flood. If the flood exceeds the design return period, water is likely to flow over the levee and generate potential erosion. One of the first observations is that if the water flowvs above a levee of height IH,by the time the water reaches the bottom of the dry side of the levee it will have a velocity V which can be very high. One simple way to evaluate that velocity is to write conservation of energy.

mgH =lmrv2 or V=/-H(7) 2 For example if the levee is 5 m high, the velocity v will be approximately 10 m/s. Of course Eq, 7 does not take into account the energy lost in friction between the water and the levee surface but it does indicate that the velocity range is much higher than typically encountered in rivers where the wvater flows at most in the range o~f 3 to 4 m/s. Furthermore a distinction should be made between events such as hurricanes on one hand and river floods on the other. The major distinction is that hurricanes may overtop a levee for about 2 hours2.314815e-5 days <br />5.555556e-4 hours <br />3.306878e-6 weeks <br />7.61e-7 months <br /> while river floods may overtop a levee for 2 days. A levee overtopping erosion chart has been developed for these two types of events and is presented in Fig. 19. It indicates which soil categories and associated erosion ffunctions are likely to resist overtopping during a 2 hour2.314815e-5 days <br />5.555556e-4 hours <br />3.306878e-6 weeks <br />7.61e-7 months <br /> and a 2 day overtopping. Recall that categories I to IV on the erosion chart are soils and categories V and VI are rocks. As can be seen, only the most erosion resistant soils can resists 2 hrs of overtopping without protection (Category IV) and no soil can sustain 2 days of overtopping without being totally eroded away.

Armoring or vegetation satisfying strict criterions need to be used to ensure that overtopping can be sustained for longer than 2 hrs.

Vegetation can help significantly to retard erosion. This vegetation however has to satisfy the following minimum requirements. It should have a mat-like appearance, a sod-forming root system, be made of perennial grasses, have a dense consistent coverage, have a minimum height of 0.3 m during flood season. Tree roots can be considered to help reinforce the levee slope if the tree is on the levee however if the tree is toppled over by the storm, it will create a major hole in the levee. Also if the tree dies, the disappearance of the roots will leave channel for the water to seep through the levee. Overall trees on levees or near levees are not a good idea.

The followving case history illustrates how the levee overtopping chart was generated.

Page A-26

CsA~~~~~.

i4... ~ - w L....k.. Sw1. .il.w1 C LwIJ Appendix A 10000 A~ty/ Erodiblt* Meodibiit 10000 l E t RAT 1000 alr y (mm/hr) Very Low Failre 2hrsErodibility

_* "* "*" Non-Erosive 0.1 **v 0.1 1.0 10.0 100.0 VELOCITY (rn/a)

Fig. 19 - Levee overtopping chart.

i. New Orleans - Katrina hurricane levee case history On August 29. 2005, levee overtopping and associated erosion contributed significantly to the Katrina hurricane disaster in New Orleans where some places are 6 m below the top of the levees. This case history describes the process by which overtopped levees e-rode and whether or not unprotected soils can resist overtopping erosion.

Soil erodibilit" Thin wall steel tube samples and bag samples were obtained from the top of the levees at shallow depth (0 to I in). Shelby tube samples and bag samples were collected from locations S1 through 515 on Fig. 20. The bag samples were reconstituted in a Shelby tube by recompacting the soil at a low and at a high compaction effort. The soil type varied widely from loose uniform fine sand to high plasticity stiff clay. EFA tests were performed on the samples. The results of all the tests arc shown on Fig. 21 and 22. One of the first observations from those figures is that the erodibility of the soils obtained from the New Orleans levee varies widely' all the way' from very high erodibility (Category I) to low erodibility (Category 4). This explains in part why some of the overtopped levees failed while other overtopped levees did not.

Page A-27

U----- - U--.

Appendix A Fig. 20 - Location of shallow samples collected from the top of the levees.

im000 Very High High ErodIb~y

  • Erodlibii*b Medium 0li

!000 °a Low

  • I ** Erodtbility EROSION i RATE 100 *
  • 1 (mm/br) l, *a 10
  • a Vrylow I *NonErodlb ve*

0.1 -"'I- "

  • 0.1 1.0 10.0 100.0 VELOCITY (m/s)

Fig. 21 - EFA test results in terms of velocity for some levee soils.

Page A-28

Wu.Wl,, t3W.U,;#1, .JWV..U, uu,,,'ww,W - u,.,,,.ug .fl,. puo*u~euWE.f3rW per iu I/d- LJIu(G)

Appendix A ia-e ,- ~ / ':

~~~.' II //III EfOGDU/ ,,

(miniar)

IklI 0 I i0 ioo 1see tWooo lIoo SHEAR STRESS (Pa)

Fig. 22 - EFA test results in terms of shear stress for some levee soils.

Water velocity Hurricanes are large rotating ma~sses of moisture which can be 400 km in diameter. They travel relatively slowly at speeds of about 40 kmn/hr. Therefore a hurricane takes about 10 hr to go over a levee or a bridge. The worst part of the storm however is only a fraction of that time. The friction generated by the wind at the air-water interface drags the water into a storm surge which can reach several meters above the mean sea level and kilometers in length. The surge associated with Katrina was about 8.5 m at Bay St. Louis, 4.6 m at Lake Borgne, and 3 m at Lake Pontchartrain. The storm surge was high enough to overtop some of the levees. As discussed earlier the water velocity at the bottom of such levees can reach 10 mis.

Geometry of the obstacle Most levees around New Orleans are between 3 and 6 m high. They have two main shapes. The first one consists of a flat top which is some 4 m wide with side slopes at about 5 horizontal to !

vertical. Because the width of such a levee configuration takes a lot of space, the second shape consists of the same shape as the first one at a reduce scale with a vertical wall extending on top of the levee. The problem addressed here is limited to the first shape (no wall).

Predictingjlevee overtopping erosion There was overwhelming evidence that the water overtopped the levees in many places; such evidence consisted mostly of ships being trapped on top of the levees when the water receded but also of debris stuck in trees at levels higher than the top of the levees. Some levees resisted the overtopping well, some levees were completely eroded. On Fig. 23, the erodibility functions for the samples taken from levees that were overtopped and resisted well are plotted as open circles while the solid dots are for the samples of levees that were completely eroded. As can be seen.

the eroded levees were made of soils in the erodibility categories I and 2 while the levees which resisted well were made of soils in the erodibility categories 3 and 4. This led to the levee overtopping chart shown in Fig. 19.

Page A-29

Appendix A o ub Er *

  • e III IN""* IV RAmTE' tO Vety Low

.I * - ,,

0.1 10I. Ok I L YELOITY (mnls)

Fig. 23 - EFA test results for the soils of levees which failed and did not fail by overtopping erosion.

j. Countermeasures for erosion protection Countermeasures for erosion protection include a number of solutions but the most prevalent is the use of rip rap (Fig. 24). Rip rap can be sized by the following USACE equation.

Where d3 o is the particle size of the riprap grain size distribution curve corresponding to 30%

finer, Hw is the water depth, F is the factor of safety, C1, is the stability coefficient, C. is the velocity distribution coefficient, CG is the blanket thickness coefficient, Vde iS the mean depth water velocity, Cs, the side slope correction factor, G, the specific gravity of the riprap, and g the acceleration due to gravity (9.81 m/s2 ). The stability coefficient C11 takes into account the roughness of the riprap blocks; it is 0.3 for angular rock and 0.375 for round rocks. The velocity distribution coefficient C+ takes into account the fact that water tends to accelerate on the outside of river bends; it is I for straight channels and inside of bends, and 1.23 in most other cases. The blanket thickness coefficient C6 is a function of the riprap gradation with a default value of I in the absence of additional data. Thne velocity Vde is the mea depth velocity for straight channels.

For river bends it is given by:

Vk, =V*, (1.74- 0.52 Iog-*-) (9) where Vac is the mean depth velocity upstream of the bend, Rc is the centerline radius of curvature of the river bend and W the river width at the water level. The side slope coefficient C5, is given by.

PageA-30

  • A Am A Appendx A

= ~i(~~) (10) where 0 is the bank angle in degrees. The specific gravity of solids G, is usually taken as 2.65.

It is very important to place a filter between the soil to be protected and the riprap layer. Without a filter the soil under the riprap may continue to erode through the large voids in the riprap. In the end the riprap may not move away but may simply go down significantly as the underlying soil erodes away. The filter may be a sand filter or a geosynthetic filter.

DESIGN PLAN __ FIELD INSTALLATION httD://www'fhwa'dot'goviengineerinsa*ydraulicsi Fig. 24 - Riprap with geosynthetic filter Installation Other countermeasures to prevent erosion include:

1. Flow deflectors such as spurs, jetties, dikes, guide banks,
2. Rigid armoring of the soil surface such as soil cement mixing and grouted mattresses,
3. Flexible armoring such as riprap, gabions, articulated blocks,
4. Pier geometry modification such as slender pier shape, debris deflectors, S. Vegetation such as woody mats, root wads,
6. Fixed and portable instrumentation such as sonars, float out devices, and
7. Periodic inspection.

k,. Internal erosion of earth dams It is estimated that 46% of earth dam failures occur due to internal erosion (Fig. 25) and half of those failures occur during the first filling of the reservoir. Yet, internal erosion of earth dams remains highly based on engineering judgment and experience. While guidelines and publications exist much remains to be studied and researched in this field. For internal erosion of an earth dam to take place, the following are required

1. a seepage flow path and a source of water
2. erodible material that can be carried by the seepage flow within the flow path
3. an unprotected exit, from which the eroded material may escape
4. for a pipe to form, the material must be able to form and support the roof of the pipe.

Four different phenomena can lead to internal erosion of an earth dam (Fig. 26):

PageA-3I

Appendlix A I. backward erosion

2. concentrated leak
3. suffusion
4. soil contact erosion Backward erosion is initiated at the exit point of the seepage path when the hydraulic gradient is too high and the erosion is gradually progressing backward forming a pipe. A cocnrtdla is internal to the soil mass, it initiates a crack or a soft zone emanating from the source of water and may or may not progress to an exit point. Erosion gradually continues and can create a pipe or a sink hole. Sufso develops when the fine particles of the soil wash out or erode through the voids formed by the coarser particles. This occurs when the amount of fine particles is smaller than the void space between the coarse particles. If on the contrary, the soil has a well graded particle size distribution with sufficiently small voids, suffusion is unlikely. Soils are called internally unstable if suffusion takes place and internally stable if particles are not eroding under seepage flow. Soil contact erosion refers to sheet flow at interfaces between soil types. It may occur for example when water seeps down the back face of the core at the interface with the filter and then the stabilizing mass.

Earth dams deform during and after construction. This movement can be compression, extension and shear distortion. Because typical dams are made of different zones playing different roles they exhibit different deformation characteristics. This can lead to differential movement resulting in cracks or soft zones where internal erosion can be initiated. Shrinkage can also create cracks which are prone to erosion if water comes to flow through them. Fell and Fry summarized the most likely locations where internal erosion can start in an earth dam (Fig. 27).

TETON DAM Fig. 25 - Eiample of internal erosion of an earth damn.

Page A-32

ContainsSecurity Sensitive Information - Withhold from public disclosureper 10 CFR 2,390(d)

Appendix A CONTACT EROSION SCONCENTRATED

\,LEAK-BACKWARD EROSION Fig. 26- Mechanisms of internal erosion failures.

DAM AXIS SSPILLWVAY RIGHIT ABUTMENT SECTION IBE DOWNSTREAM FOUNDATiON ~ ~

-~ -5w

5. Embankment to foundation 2.I. Spillway Adjacent wall interface to condnit 6. Foundation ( if the foundation is soil or
3. Crack associated with steep erodible rock) abutment profile 7. Embankment through poorly compacted layer,
4. Desiccation on top of core crack, (or by backward erosion if the core is cohesioniess)

Fig. 27 - PosSible locations of initiation of internal erosion (After Fell, Fry, 2005).

Page.A-33

.. *,R.

S*,&;,..,*..; ,ph, pI;,l,5i. - *T'dhMAvvZ, d; .. ,Vs H '..rT' 5..F~

LI(UJ Appendix A Coarse silt and fine sand are among the most erodible soils. Therefore earth dams containing significant amounts of such materials will be more prone to internal erosion. Clays in general and high plasticity clays in particular are more resistant to erosion as long as the electrical bonds between particles are not destroyed by chemicals. It seems that some core materials of glacial origin such as glacial tills can be particularly susceptible to internal erosion. Sherard gave a range of gradation of soils which can lead to internal erosion problems (Fig. 28).

The soils which are most susceptible to suffusion are those where the volume of fines is less than the volume of the voids between coarse particles. In this case, the fines can move easily between the coarse particles and erode away to an exit face. After suffusion, such soils are devoid of fines and become very pervious clean gravel for example. Fell and Fry again indicate that gap graded soils and coarsely graded soils with a flat tail of fines (Fig. 29) are most susceptible to suffusion.

100 80 PERCENT 60 FINER

(%) 40 20 0 ~

0.001 0.01 0.1 1 10 100 1000 GRAIN SIZE, mm Fig. 28 - Range of problems soils for internal erosion (after Sherard, 1979).

100 80 60 PERCENT PASSING 40 20 0 '-

0.1300 0.01 0.2 I 1o  ! 00 !1000 PARTICLE SIZE (ram)

Fig. 29 - Range of problems soils for suffusion (after Fell and Fry, 2005).

Page A-34

Appendix A One of the important criterions to evaluate erosion is to calculate the hydraulic gradient and compare it to the critical gradient. The critical gradient is given by Values of icr typically vary in the range of 0.85 to I .2. The hydraulic gradient in dams depends on many factors including the difference in water level between the upstream and the dowvnstream, the length of the drainage path, and the relative hydraulic conductivity, of the various zones. The target maximum gradient in the flow must be kept much lower than the critical value especially in areas where internal erosion is possible. Fig. 30 shows ranges of hydraulic gradient values which are associated with initiation of internal erosion on one hand and full development of piping on the other for unfiltered exit faces. Generally speaking there is a trend towards higher porosity soils beginning to erode at lower hydraulic gradients even lower than 0.3. Yet soils wvith plastic fines erode at higher gradients but gap-graded soils begin to erode at lower gradients than non gap-graded soils with the same fine content. The US Army Corps of Engineers uses a lowver bound value of the critical hydraulic gradient equal to 0.8 and allows a hydraulic gradient of up to 0.5 at the toe of levees provided a number of conditions are met (USAGE). Another way to address the incipient motion of soil particles in internal erosion problems is to use the concept of critical velocity and charts such as Fig. II1 and 12. Howvever these critical velocities were developed from sheet flow test and the critical velocity may be different from those initiating internal erosion.

1.2 __.._, iE *q *.--

1.0

  • L "'" P~ "

0.8/"":" 9 HYDRAULIC V .. .. **

GRADIENT 0.6 ** .~

0.2 /.* .  :: -*-*

1 2 3 4 5 6 COEF. OF UNIFORMIT"Y CuI D6 /DIO Fig. 30 - Range of hydraulic gradient values associated with internal erosion (after Perzlmaier, 2005).

Most of the time, a complete breach occurs within 12 hours1.388889e-4 days <br />0.00333 hours <br />1.984127e-5 weeks <br />4.566e-6 months <br /> Of first visual detection of internal erosion and sometimes in less than 6 hours6.944444e-5 days <br />0.00167 hours <br />9.920635e-6 weeks <br />2.283e-6 months <br />. The majority of failures occur during the first filling or within 5 years after first filling. The process of suffusion tends to develop more slowly than the back erosion and piping process.

Page A-35

Appendix A The solution to many of the internal erosion problems is the use of quality filters. A filter is a layer of soil placed between a fine grained soil and coarse grain soil to transition the flow without having the fines of the fine grained soil erode through the voids of the coarse grained soil. The grain size distribution curve of the soil filter layer is designed to provide this transition in a gradual fine to coarse fashion.

Page A-36

Appendix B Original Xu and Zhang Regression Equations and HRR Hydrograph

a.. *.,*,.,, *=,,.,, I,;I,,.,cIII U ,U-" .... ".....ua - i i,~a~iw i,~ n £.W~d APPENDIX B APPENDIX B. ORIGINAL XU AND ZHANG REGRESSION EQUATIONS B.1 Overview The original Xu and Zhang (2009) regression methodology and its previous implementation to the Jocassee Dam are described in this Appendix. This provides background for Section 6 where we address the questions raised by the*FERC and the NRC. It also provides background for Section 7 where we describe the implementation of a revised version of the Xu and Zhang equations in a sensitivity analysis, which provides support for the breach hydrograph submitted in the Hydrologic Reevaluation Report (HRR) to the NRC by Duke on March 12, 2013 (Duke 2013).

Section B.2 summarizes the breach parameters and control variables in the Xu and Zhang (2009) regression equations. Section B,3 discusses the case histories that were used to develop these equations and Section B.4 summarizes the regression equations, including their confidence limits. The implementation of the original Xu and Zhang (2009) methodology for the Jocassee Dam is described in Section 8.5 and details of the use of the failure time estimate in the HEC-RAS model are discussed in S ection B.6, B.2 Breach Parameters and Control Variables The Xu and Zhang (2009) multiple regression equations were developed to pred'ict the following five breach parameters (dependent variables), which are divided into two groups, breach geometry and breach hydrograph:

  • Breach Geometry o Breach depth (Hb) o Breach top width (Bt) o Average breach width (Boe)
  • Hydrograph o Peak outflow rate (Qp,)

o Breach development time or failure time (T1)

The predicted breach side slope, z, which is an input to HEC-RAS breach model, can be calculated from the breach depth (Hb), breach top width (Bt) and average breach width (Bave).

The predicted breach bottom elevation, which is also an input to the HEC-RAS breach model, can be calculated by subtracting the breach depth from. the d/am crest elevation.

Unlike most previous breach parameters regression relationships, Xu and zhang (2009) included :soil erodibility as a' control (independent) variable. In fact they found it to be the single most important of all the control Variables that they considered in terms of its explanation of the variance in "observed" breach parameter values across the case histories ,on which their methodology is based.

P AG6E B-I

o*.... *. ., ;* .;.Is*;;;r,,*v - "rI-nr,,iu; [u,,,awpuunvu uiacl.iuureper 1u 1PMK x.JWu(a)

APPENDIX B The complete list of five control variables that they used to estimate breach parameters is as follows, including norm atization for the first two variables:

  • Dam height (X1 = -dH,.r, dam height Hd and areferenceheight Hr, where H,.= 15mi),
  • Reservoir shape coefficient ('X2 *-Vw11 /Hw, volume of water above breach invert Vw and depth of waterabove the breach invert at the time of failure, l-w.),
  • Dam type (with corewalls, concrete faced and homogeneous/zoned-fill),
  • Failure mode (overtopping and seepage erosion/piping),
  • Dam erodibility (high, medium and low).

Xu and Zhang (2009) included rock-flll dams in :the homogeneous/zoned-fill dam type. Dam type, failure mode and dam erodibility are included in the regression analysis as virtual discrete variables that represent either the presence or absence of each of these attributes.

As mentioned above, Xu and Zhang (2009) found dam erodibility to be the most important control variable for predicting all five breach parameters. They describe dam erodibility as a relative measure based on the embankment material compositions and compaction conditions, dam cross-sectional geometry, construction time and other relevant pieces of construction information. The three erosion categories (low, medium or 'high) used in the Xu and Zhang (2009) equations refer to the technical lecture paper by Briaud (2008), whereby soils and rocks are classified into various erosion resistance categories based on erosion velocity or shear stress, as shown in Figures 4.1a and b, respectively. The appropriateness of using the Briaud erosion categories in the Xu and Zhang (2009) methodology was confirmed by Professor Briaud as detailed in Appendix A and summarized in Section 4.2.

B.3 Case Histories The Xu and Zhang (2009) regression equations are based on an analysis that includes more recent breaches than are included in earlier relationships, such as Froehlich (1995a and b). It

.also includes data from China that has not been previously used in breach regression equations. Data from a total of 75 earth and rockflll dam failure cases was used to develop the original multiple regression equations, although for each breach parameter the number of case histories that were used to estimate the best exact and best simplified equations, respectively are as listed below:

  • Breach depth (Hb): 66 and 71
  • Breach top width (Bt): 54 and 61
  • Average breach width (Bay.): 45 and 53
  • Peak outflow rate (Qp): 34 and 39
  • Breach development time or failure time (Tt): 28 and 30 PAGE B3-2

I------ 5~~* -- -- - - ----- I-,

...... ir* .....

APPENDIX B 38 (51%) of the 75 case histories are for US dams, 32 (43%) are from China and 5 (7%) are from other countries. 7% (5) of the 75 case histories are for dams that were classified as dams with core walls, 5% (4) were classified as concrete-faced dams and the remainder were classified as composite-fill dams. 61% (46) of the case history dams failed by overtopping and 39% (29) by seepage-erosion failure modes. 40% (30) of the case history dams were classified as high erodibility, 51% (38) as medium erodibility and 9% (7) as low erodibility.

Figures B~la and b show the depth of water abOve breach invert, Hw, and volume of water at the breach time, Vw, for the 75 case histories onarithmetic-arithmetic and arithmetic-logarithmic axes, respectively. Across the 75 case histories the depth of water above breach invert, Hw, ranges from 1.7 to 77 m (5.5 - 254 feet) compared with a predicted value of 72.5 m (238 feet) for the Jocassee Dam using the original Xu and Zhang (2009) methodology. The dam heights, Hd, range between 3.2 and 93 m (10 - 305 feet) compared with 117.3 m (385 feet) for the Jocassee Dam. The volume of wafer at the breach time varied between 0.025 to 660.0 m3 x 106 (5.5 - 535,000 acre-feet) compared with a predicted value of 1.34 x 108 m3 (1,088,208 acre-feet) for the Jocassee Dam using the original Xu and Zhang (2009) methodology.

B.4 Regression Equations and Confidence Intervals Xu and Zhang (2009) developed two types Of multiple regression eqUatiOns for estimating the five breach parameters:

  • Best exact prediction equations - based only on failure cases where all five control variables were available

, Best simplified prediction equations - includes some additional failure cases where not all five control variables were 'avail able Best exact prediction regression equation for breach depth is in the following additive (linear) form:

Yj= bo + blX1. + b2X2 + (b31X31 + b32 X32 + b*Xs 3) + (b41X4 + b42X42)'

+ (bslX51 + b52X52 + bs3X5 3) (1) in which:

Y* = the first (i.e. i = 1) breach parameter or dependent variable, i.e.

normalized breach depth as defined in Figure B.2 Xii = the control variables as defined in Figure B.2 bjj = the regression coefficients corresponding to the control variables PAGE B-3

cz-vzt.: Uu,.~tf.,..

................. 0 L:.........L~.... ~1~4~rr-- - E'~af -- 10 017? E.W~1 APPENDIX B Original Xii and Zhang Data U

70 I.

150 SOther IU mIOCahOO O~iin.I Xu and Z*man

'40.

I 0 200 400 6OCX 8O0 1000 1200 1400 V.Iqmwe of wowr awe bq,.d hwmt Vw Ii. 106 m31 a) Arithmetic-arfthmetlc scales Original Xii and Zhang Data 80t IU 9

U

  • USA m Chin a 140 .1D U mJoca.., - o~rigin xu rand Zhang I ;X.* o 0.01 0.1 1 10 100 1000 Vuiwn. of wotr do,. beumds Inwt Vw Ia 106 m33 b) Arithme.timogarlthmic scales Figure B.1. Depth of water above breach invert vs. volume of watr at the breach time for the original Xu and Zhang (2009) case h Istborles.

P A E B3f

-4

'~t~"~ ~~tf1tr b'Orre!r S nT3J~i1Jta3fl w;u~j: r:.... ,....LL... ~ ,.,~. ~,.

APPENDIX B Breaching Parameters Control Variables Breach .depth Yt= Jib/Ha Dam height X =H/r Breach top width Y= Bt/Hb Reservoir shape coefficient x2 = w ,,

Average breach width Y3 = Bave/Jib Dam type X31 X32 X3 3 Peak outflow rate y, O/ 13 with corewalls la(eb) 0(1) 0(1)

Failure time Ys= T1,/T,. concrete faced 0(1) 1(e) 0(*1) homogeneOus/zoned ,fill 0(1). 0(1) 1(e)

Failure mode X42 X42 ,

overtopping 1(e) 0(1) seepage erosion/piping 0(1) 1(e)

Dam erodibility xs2 X52 xs3 high ,l(e). 0(1) 0(1) medium 0(1) 1(e) 0(1) low 0(1) 0(1) 1(e)

Note: B Values for additive regression analy sis bValues for multiplicative regression analysis

.Hr=15m;T =1hour Figure B.2. Summary of the five breach parameters and five control variables in the Xu and Zhang (2009) regression-eq uations For the other four breach parameters, the following multiplicative (non-linear) form of regression equation was Used in which all five .control variables were included for the best exact prediction equations but a subset of these variables were included for the best simplified prediction equations, as described below:. *

-- = z (3) in which:

Yj = the second through fifth (i.e. ! = 2, 3, 4 and 5) breach parameters or dependent variables as defined in Figure B.2 Zt = untransformed breach parameter in natural space, To obtain the predicted breach parameter values in natural space a log transformation must be applied to from Equation 2 , as follows; Zi = log (Y1)

= b0, + b1X1 + b2X2 + (b31X31 + .b32X32 + b*,X3 ) + (b41X41 +I-b 42X42) +

(b51X61 + b52X52 + b83X53) (4)

P AG EB-S

  • .,,.;d,'*  ;,[,.a - II,..,IU ,.u,, puI, Up .i;*U.urW PUt Iv.,rI £.*u(g/

~APPENDIX B Under the standard assumption in regression analysis that the variability, in the breach

  • parameters that is not accounted for in (i.e. explained by) the regression equations (i.e. by the
  • variation in the values of the control variables) is distributed according to a normal or Gaussian (bell curve),.probability distribution (Haan 1977). Under this assumption, the mean values predicted that are obtained using Equations I and 2 are also the median or 5 0- th percentile values. However, for the multiplicative form of the reg~ression equation in Equation 2, the. effect of the log transformation shown in Equation 4 is that the variability in the breach parameters that is not accounted for in (i~e. explained by) the regression equation is distributed according to a log-normal probability distribution. After 'transformation, the mean value., predicted in transformed log space from Equation 2, which is also the median or 5 0 th percentile value in log Space, is still the median ,in the natural space but it is not the mean value in the. natural space due to the effect of the log transformation. Another effect of this log transformation is that the confidence intervals .are asymmetric.

By design, all five control variables appear in the best exact prediction equations as shown in' Figure B.2. However, for breach depth, Hb, the best exact prediction equation excludes the reservoir shape coefficient (X2 = VW, '3!Hw) for two reasons. First, the reservoir shape coefficient was found to have a very small Contribution to explaining the variance in predicting Hb (Xu and Zhang 2009). Second, both t:he volume of water above breach invert, Vw, and the depth' of water above the breach invert at the time of failure, H, (where Hw = normal maximum reservoir level of 1,11i0 feet 'msl. minus Hb) are functions of Hb and so if the reservoir shape coefficient was included as a control variable then H~b would appear on both the left and right sides of regression equation.

Best Simplified prediction equations were obtainedl through a stepwise regression procedure in which regression equations with .different combinations of the five contr~ol variables were developed for each breach parameter. This is a standard method in regression analysis (Haan 1977) with the goal of striking a balance between prediction accuracy and simplicity in the equatiOn (i.e. fewer control variables). The equation that has the highest adjusted coefficient of determination, zRoaj, is selected as the best simplified equation, where R~dj is defined as follows:

n--i)R2 - k  :(5) in which:

n = number case histories for which data are used in the regression

.analysis

. = 'coefficient of determination k = number of control variables used in'the 'regressiOn analy sis The (unadjusted) coefficient of determination, R2, is less for the selected best simplified prediction equation than for. the best exact prediction equation for the same. breach parameter because fewer independent or control variables are included. Hence the best exact prediction P A 6E -6

- fl.. p.~ f..9 .5. . * .-. l.. ,r _sr n.i l* m-. *SE* ScaRn auamvu wnl*muv. * * -- W#l*mallVl* Uwvleu iJ* lmV *m* n* llma *. i* 11 IIV Vl IIII. Ab*ll*'Vl*lbB*

" ,APPENDIX B equations have greater prediction accuracy because they explain a greater fraction of the variability between ,values of each breach parameter across the case histories. However, the standard error-of the regression for the best simplified prediction equation, and hence the width of the confidence intervals for breach parameter estimates, is less than for thle best exact prediction equation for the same breach parameter. This is because there are more degrees of freedom when fewer regression coefficients are estimated because, there are fewer control variabres. Another factor that may further decrease the standard error of regression, s2, is that additional case histories may be available tO use in the regression when. there are fewer control variables because for some case histories estimates were. not available for all five control variables as required ifor the best exact prediction equations.

The-XU and Zhang (2009) best exact and best-simplified prediction equations for all five breach parameters are presented in terms of the estimated values of their regression coefficients .(b*'s) in Tables B.1 and B.2, respectively. These tables also include the standard error of the regression, which-can be Used to calculate confidence intervals for breach parameter estimates in addition to median predictions that are obtained directly from the regression equations.

Xu and Zhang (2009) conducted a comparison with two breach prediction methods (Bureau of Reclamation 1982 and 1988 and Froehlich 1995a and b) and demonstrated that their method provides a lower bias and standard error on predictions than these other methods. They admit that since this comparison used data on which their, model is based it may have had an advantage over other models included in the comparison, but they nevertheless claim that the comparison iS fair.

Xu and Zhang (2009) included two applications of their equations .to actual dam breaches for..

Banqiao and Teton dams. Banqiao Dam was an overtopping failure and Teton Dam was a piping failure.. The predictions are comnpared with the Observed values of the breach parameters for both the best exact and the best simplified models in Tables 7 and 8 of their paper,

  • respectively. They also include lower and upper bound estimates based on a 95% confidence interval. The theoretical meaning of this confidence interval is that there is a .95% chance that the :true values of the breach parameters are *contained* in the range ,between the lower and upper bound values. The lower and upper bound values for an additive (linear) regression model for breach depth are equally spaced on either side, of the median, estimate and this can be seen, within the limits of round off in the estimates, as shown in Tables 7 and 8 of the Xu and Zhang (2009) paper. However, .the spacing between the median estimates and .the lower and upper bounds for the remaining, four breach parameters is very *asymmetric due to the multiplicative (non-linear) form of the regression models for these parameters as explained above. Specifically there are approximately two to three and a half fold differences between the median and lower bound estimates compared .with between .the upper, bound and median estimates for these breach parameters.. Clearly the widths of the 95% confidence intervals are large for all breach parameters. We return to the topic of the confidence intervals on the Xu and Zhang (2009) breach parameter estimates in Section B.5 where we discuss how they apply specifically to the Jocassee Dam breach parameter estimates that. are the focus of this report.

PAGE 8-7

q

,....:....,L.,, LL 1Z' Z DIL.. t.SiLL T.... I

~f 3.flCd APPENDIX B Table B.1. Summary of the five Xu and Zhang (2009) best exact regression equations Breach Parameter Y(orlogv)

Number 'Control Variables ofCases [1gnnlna (orlog b0) bO b0 h b 2 2 b1 b 1 b2 b3r 1 b31 3 l b2 42

____________I____S2*vl*X) bl b 1 b21 b2 b3S2vlx(Or S 1 Reservoir ____Dam Type _________ rdibi~lty Care lor InecptHt Sh~:Core Wall CFRD Homog overtop .Piping High Medium Low

______Coef., ___ Zoned Hb/Hd 66 Xl,2,3,4,S 0.453 0.023 0.000 0.143 0.1,76 0.132 0.218 0.236 0.254 0.168 ,0.031 0.350 0.012

{og(Bt/H'b)* 54 lnX1,2.3,4,S 0.060 :0.092 0.308 0.061 0*088 -0.089 0.299 -0.239 0.4Ul -0.062. .0.289 0.620 0.169 Iog,(Bove/Hbj 43 lnXl,2,3,4,5 -0.240 0.133 0.662 -0.041* 0.026 -0.226 0.148 -0.389 0.291 -0*140 -0.391 0.648 0.184 fogtQp/VgVw5/3) 34 InX1.2,3,4,S -1.744 0.199 -1.274 -0.S03 -0.$91' -0.649 -0..705 -1.039 -0.007 -0.375 -1.362 0.0 0.365 log(TJ/Tr) ,2.8 InXl,2,3,4,.5 -1.190 0.707 1.22g -0.327 -0.674 -0.189 "-0.579 -0.611 -1.205 -0.56.. 0.579 0.793 0.365 Table B.2._Summaryof the five revised Xu and Zhang (2009)_best simplified regression equations Ba ea de P recPaaee e Nu b r Nuer Co n trol Variables bO b b2 b31 h32 b33 b41. b42 b51 bS2 b53 4

R2 a*

$O11 2 ylx1 (or gy~x VY(orliogY) of Cases: !~:nnier (or loghO) I Il $2I

{0.343

..... .... ....... Reservoir - . DamTvpe _ _ __ _ _ __ErodibilltyCate [ry . _

Intercept H-gt Shape CoroWalogRDOvertop Piping High Medium Low

___________________Coef. __ore_ Wall -R __ ,Zoned Hb/Hd 71 Xl,5 03729 -0.025 _ ,. 0.257J 0.129 0.314 0.011 Ioq(St/Ilb) 61 linX24,4S -0.004 0.558 ___ __ 0.258 -0162 .0.377 -0.092 -0.188 0.584 0.159 Ioq(Save/Hb) 53 InX2,4S 1.713 0.739 ___ __ -1.207 .4-.747 -0.613 .4.073 -1.268 0.669 0.173 lop(QJp/VpVwSI3) 39 InX2,4,5 2.--020 1.276 ___ -0.788 :-1.232

-______ -0.089 -0.498 -1.433 .0.777 0.304 (otl~i/Tr) 30 In12* -1.593 0).654 1.246 ___ __ ______ -1.375 -0.828 0.310' 0.727, 0.288*

PA E .B-8"

APPENDIX 8 B.5 Implementation for Jocassee Dam - Xu and Zhang Breach Parameter Estimates ..

As described in our February 2013 repOrt (Ehasz and Bowles 2013), we applied the Xu and Zhang (2009) regression equations to the Jocassee Dam to obtain the estimates of the breach parameters for a sunny-day piping failure. We also estimated the confidence intervals for the estimated breach parameters. These were calculated using the values of the standard errors of regression published by Xu and Zhang (2009) in Tables Bl.1and B.2 and the equations for the confidence intervals for a multiple regression that can be found in many textbooks (e.g. Haan 1977). To verify our spreadsheet for applying the Xu and Zhang (2009) regression equations we first .reproduced, within a small round-off error, the median and confidence interval estimates that are presented in the. Xu and Zhang (2009) paper for Teton and Banqiao dams. We also closely matched estimates made independently by HDR for the Jocassee Dam as shown in our February 2013 report (Ehasz and Bowles 2013)*

Values representing the Jocassee Dam were assigned to the five control (independent)

Variables in the Xu and Zhang (2009) regression equations as follows:

  • Dam height, Hd = 385 feet.
  • Reservoir shape coeffiCient, Vw113/Hw, in which V.w is the volume of water above breach invert based on the stage-capacity relationship for Lake Jocassee evaluated between the normal maximum reservoir level of 1,110 feet msl. and the elevation of the breach invert [i.e. crest elevation of 1,125 feet msL. minus breach depth Hb and the depth of water above the breach invert at the time of failure=, Hw (iLe. normal maximum reservoir level of 1,110 feet msl. minus breach depth)]. Both VAw and Hw are calculated using the predicted values of breach depth obtained from Xu and Zhang (2009). The Lake Jocassee elevation-area-storage volume was obtained from Jocassee DWG No. J-17.
  • Dam type selected as ho~mogeneous/zoned-fill, which iS. the dam type that includes rockfill dams in the Xu and Zhang (2009) methodology.
  • *Failure mode selected as seepage erosion/piping,
  • Dam erodibility assigned as the low erosion category.

The low erosion category was assigned based on the characterization of the Jocassee Dam summarized in Section 3.1 and the descriptions of the erosion categories from Briaud (2008) contained in Figures 4,ia and b. The Jocasee. Dam is desioned and constructed as a modern dam veW deser7)(F)

Wit dam wth vry dese

-core ~zone. The assignment of the 'low erosion category for Jocassee Dam for application of the Xu arnd Zhang (2009) methodology was subsequently confirmed by Professor Briaud as detailed in Appendix A and summarized in Section 4.3.

Table 8.3 shows the input values and the breach parameter estimates from our application of the original Xu and Zhang (2009) methodologY to the Jocassee' Dam. Separate breach parameter estimates are included for the best exact and best simeplified prediction regression P A GEB-9

(

'~~sugorw ~sour~r;~ L~rxn~xj rz~r piess;:3. 1~ F¶ ~J~

APPENDIX B Table B.3. Breach parameters estimates from Xu and Zhang (2009) application to

________________Jocassee Dam.

Brah aamtr rsinBest Exact Prediction Best simplifie d predic.tion

,Eoin,95% Confidence interval Mein95%Confidence Interval BehPaaee ,Category *Median Lower' Upper Mein Lower .Upper Height of breach, Hb ft, Low 253 18, 337 255.* .761 334 Failure time, Tf hrs. Low' .'1°( F i Breachb top with, St ft. - Low 701 5 306 1,606 55566 299 _ .1,485 Averge Savreahft wdth Lb 56 24 1,36 55; 23 ,19 Avrg width,ra~

Ba-A.eft--..w-.566-----------------S--.22-.... 1,193 Pekot oo t/e. Low (bx )()F equations. A more-detailed version of Table B.3; which includes the values calculated for all regression parameters and references the regression equation numbers for the equations that we used from the Xu and Zhang (2009), paper, is contained in Appendix B of our February 2013 report (Ehasz and Bowles 2013).

From Table B.3 it can be .seen that using the low erodibility caamn.the best exact prediction

  • equations, the median failure time is estimated to be aboul" - - " J the median, breach top width about 700 feet, the. median average breach width about 570. feet, hemedian (or mean) breach depth about 250 feet, and the median peak discharge unde (t)(7)(F) Icfs. Estimates based on the best simplified prediction equations are smaller for all parameters except the breach depth.

The 95% confidence interval estimates for 'each breachi parameter are shown in Table B.3 as lower and upper bound estimates that define the confidence interval both below and above the median estimates. Similar to the examPles for Banqiao and Teton dams, which we discuss in Section B.4, the asymmetry in the confidence intervals can be seen for all breach parameters except breach depth, which is symmetrical because of the additive form ,of the regression equations for breach depth as explained in Section B.4. The symmetry in breach parameter estimates for breach: depth and the asymmetry in-estimates for failure time, breach top Width, and average breach width can be seen in Figures B.3a and b. In these figures the confidence intervals for breach parameter estimates for Jocassee Dam are plotted as a ratio to the median estimate for the Xu and Zhang (2009) best exact and best simplified prediction equations, respectively. The asymmetry 'in the confidence intervals for failure .time,, breach top .width, :and

-average breach width can -be seen by the longer lines above the-median estimate. (plotted at-a ratio = 1.0 shown by the blue dashed line) than b eiow the median estimate.

In Table B,3 we have placed boXes around the values ,of the breach parameters that we recommended in our February 2013 report (EhasZ and Bowles 2013) as being most applicable.

to the Jocassee Dam. These were ,used in deVeloping the HRR breach hydrograph submitted to the NRC by Duke (2013). They are median estimates based on the low erosion category.

P A 6 E B-IO

t.LappU fp.. aflaa..

TpLpUIt. l. ... lLll

.ql I.I#IfdlN..pppit.J.* - WI E~drLI tsfla~FI 5St.~dR* JLdESUJ, l./l'* Us~.at*mISd~.6SU c8.l = Prt, E t u mI*,ar.

EI .fJEdll APPENDIX B Best Exact Prediction 4.0

.:* 3.5 . -" . .

  • 3.O E 25S 2.0___ _____ I_____

£1.0 ' "'

S0.5 ..

Height of. Failure time Breach top Average Peak outflow breach width breach .width Breach Parameter a) Best exact predictions Best Simplified Prediction 4.0 "

.: 3.5 "..

~3.o . ......

.~2.5

' ~2.0.. . .-

10.5 ..

Height of Failure time Breach top Ave rg. Pa ufo hrage, width Pea* outflow

  • breach width bread wdt
  • Breach Paramneter b) Best simplified predictions Figure B,3.* Relative Width of confidence intervals for the original Xu and Zhang (2009) breach parameter estimates for Jocassee Dam expressed as a ratio to the median estimate (ratio = 1.0).

-PA6 E B-il

/ ' APPENDIX B The basis for using low erosion category is explained ,above in this section. The basis for using median estimates is discussed below.

  • The Xu and Zhang (2009) median and confidence interval breach parameter estimates have the following bases:
  • Median estimate: Predicted values from applying a regression .equation whose coefficients have been estimated to minimize the sum of the squares of the differences between the predicted values associated with the regression equation .and the observed values. All predicted values, excePt for breach depth, must be transformed using a log transformation to their natural space as shown in Equation 4. The resulting regression equation represents or "explains" the fraction, R2, of the variability in the observed breach parameter values in the data, set of historical dam breaches in terms .of the variation in the observed values of the control variables that were uSed to derive the regression equation in the space in which the regression analysis was performed (i.e.

natural space for breach depth and log transformed space* for all four other breach parameters). Thus *a regression equation that perfectly fits the observed breach parameter values would have an R2 value equal to 100%.

  • Lower and upper bound estimates (Confidence interval): Based on the variability between observed breach parameter values in the data set of historical dam breaches that is not represented* or "unexplained" by a regression equation. This unexplained variability is the fraction, (1 - R2), of the variability in the observed breach parameter values in the data set Of historical dam breaches in the space in which the regression analysis was perfOrmed (i.e. natural sPace for breach depth and log transformed space for all four other breach parameters).

Graphically one can picture the unexplained viariability in breach parameter estimates as being a scatter of points representing the observed breach parameter values about the regression line. A key question is, "Where would one expect Jocas see Dam to fit in the range of the scatter or unexplained variation of breach parameter values for the data setof historical dam breaches used by Xu and Zhang (2009)?" Based on the fact that the Jocassee Dam is a well designed and constructed rockfill dam, which has incorporated modern design criteria and defensive design features (see Section 3.1), the breach: geometry parameter estimates are expected to be in the range between the median and lower bound estimates. Additional factors that Support these ranges of geometric breach parameter estimates include the following:

  • Uni-directional breach formation: A breach from the. very unlikely failure mode of piping through the foundation in the4~)CF(* iwould, start high On thJCb(F(r of the Jocassee Dam and can only progress downwards and laterally towards the center of the dam in contrast to developing in two directions as is the case for most historical breaches. This would be expected to reduce the width of the breach because of the greater erosional resistance of the stable (b)(7)(F) iof the breach. In PA$G E B-12

~urnzamn* owuruIy oenw*.v, i,,,u,.uwuur .* "5', ,U;,,5u,-,v,u,,

v-';-*;'";*. *,'. 13, v. ,. b.o;J APPENDIX B

~addition it would be expect to slow the rate of breach development and reduce the peak breach flow rate.

Deposition of eroded rockfiil material and development of tailwater: The rockflul material moved by the breaching process would ravel downstream by the flow through the breach and much of this material would be deposited within a short distance downstream of the dam. This would cause a significant taliwater to develop that would reduce flow velocities through the breach thus inhibiting both downward erosion and lateral development-of the breach with the result that a narrower and shallower breach would be formed, taking a longer"time to form, and resulting in a lower peak breach flow rate.

The combination of all these considerations provides strong evidence that the use of median values of breach geometry parameter restimates for the Jocassee Dam would be a conservative choice. TherefOre we would expect that realistic breach' geometry parameter estimates for the Jocassee Dam would be in the range between the median and lower bound estimates obtained from the Xu and Zhang (2009) regression methodology.

Similar arguments to those made for breach geometry parameter estimates for the Jocassee Dam being in the range between the median and lower bound estimates can be made for failure time,, except that theY would support a failure time 'estimate between the median and the Upper bound estimate. Therefore, the use of the median estimate for failure time is also considered to provide a conservative esti mate of the failure time as defined by Xu and Zhang *(2009).

It follows from the same reasoning as discussed above for the breach geometry parameter estimates and the failure time estimate for the Jocassee Dam, that the peak breach flow estimate would be expected to be in the range between the median and lower bound estimates obtained from the Xu and Zhang (2009) regression methodology.

Before the breach parameter estimates can be used in the. HEC-RAS simulation, model for the Jocassee Dam, the definition of failure time in Xu and Zhang (2009) must be fully understood so that it can be appropriately used in the model. This is addressed in the following subsection.

B.6 Implementation for Jocassee Dam - Use of Xu and Zhang (2009) Failure Time Estimate in HEC-RAS Model It is important that the definition of failure time.l used by Xu and Zhang, (2009) is taken into

  • account when using failure time estimates from. their methodology in the HEC-RAS. breach mode~l because this definition is different to the definition that is corrmonly used. (e.g. Froehlich I!995b and 2008). This relates directly` to the fifth question raised by the FERC and NRC (see Section 2). In this subsection we explain how the Xu and Zhang (2009) failure time definition differs.from the definition used by others (e~g. Froehlich 1995b and 2008) and how that was taken into account in the HEC-RAS breach model for the Jocassee Dam.

P A G E B-13

~rru-ry YW7F¶IV~ rnr~r~r:on w:rnnca r.-crr p'::ie Ir:3s:30u:8 ,sr 7U L~fl L3UU;~JWf APPENDIX B For the purpose of this discussion, Figure B.4 is adapted from the Xu and Zhang (2009) paper.

It illustrates, for a seepage/erosion/piping failure mode, the distinction between the breach initiation and breach development phases of the breaching process. Outflow during the breach initiation phase is small, and in the case of a piping failure it is the flow through a developing pipe or seepage channel. As commonly defined the time for the breach development phase is the time that the embankment would take to washout after the internal erosion process (piping) advances far enough to form a cavern within the downstream shell of the dam leading to a collapse of a portion of the downstream shell that exposes the core and results in a partial and progressive collapse of the core, exposing it to overtopping. The overtopping would then washout the em bankment.

80000A: Outflow repidly Increased E.60000

[- C.. B: Dam crest collapsed C: Peak outflow Breach Initiation Breach Dev lo nt. C: Breach fully formed Phase (Xu and Phase (Xu nd Zha g)

SZhang) \,

AIharea BIDeveaopontPhase ',

-- 20000[I *hs B Developr(F ntich)s 10 a.m. 11 12 13 p.m. 14 15 16 Time (hour)

Figure B.4. Definition of breach phases in Xu and Zhang (2009) compared with Froehlich (1995b and 2008) illustrated for failure of Teton Dam [Adapted from Xu and Zhang (2009)].

Figure 8.4 shows the example of the breach outflow hydrograph for the piping failure of the Teton Dam in 1976. Xu and Zhang (2009) were based on breach development time as defined by Wahl 2004 which states "breach development begins when a breach has reached the point at which the volume of the reservoiris compromised and failure becomes imminent. During the breach development phase, outflow from the dam increases rapidly. The breach development time ends when the breach reaches its final size." According to the Xu and Zhang (2009) definition, the time of 10:30 a.m. is a critical point where failure becomes imminent and this time separates the breach initiation phase (ending at point A) from the breach development phase (between points A and D). After 10:30 a.m. (point A) the rates of discharge and erosion of embankment materials from the pipe outflow increased more rapidly. After the collapse of the dam crest at about 11:55 a.m. (point B), the breach developed rapidly due to overtopping of the collapsed dam crest and soon a peak discharge at about 12:15 p.m. (point C). According to Xu and Zhang (2009) the failure time associated with the breach development process, Tf, was approximately 4 hours4.62963e-5 days <br />0.00111 hours <br />6.613757e-6 weeks <br />1.522e-6 months <br /> starting at about 10:30 aim. (point A) and ending at about 2;30 p.m.

(point D).Many authors, including Fell et al (2003), point out that it has not been possible to identify the starting time for internal erosion associated with piping, and so it has not been P AC B-14

Cct2 " r- ... .. ........ L,;;A.

uY~,;;*~ p.r ,u *,r,,h~u(oJ APPENDIX B possible to estimate breach initiation phase times for historical dam breaches. *As indicated in Figure BA4, it is the breach development time, Tf, 'between points A and D that is the predicted "failure time" in the Xu and Zhang (2009) method. However, this definition of failure ,time differs to that used 'by others, such as Froehlich (1995b and 2008). and Wahl (2013), in which breach development time 4 . is. defined as the period of higher outflow between points B and E: in Figure B3.4, or about 1-.25 hour2.893519e-4 days <br />0.00694 hours <br />4.133598e-5 weeks <br />9.5125e-6 months <br />s5 . Specifically, the more commonly-used definitions of breach development time are as. follows:

    • the 'time from the beginning of rapid growth of a breach to the time when significant*

lateralerosion has stopped (Froehlich 1995b)

  • the needed time from initiation of a breach until it has reached its maximum size (Froehlich 2008)
  • the time from when the active erosion front reaches upstream face of dam to when the breach has enlarged to its maximum size (Wah1 2013)

From Figure 8.4 it is clear that the Xu and Zhang (2009) definition of breach development time is a longer :period of time (points A - D) than the more commonly-used definition (points B - E).

The importance is not so much that there are differences between the way that failure time is defined in Xu and Zhang (2009) compared with other methods, but rather that the way that failure time is applied in a breach model (e.g. HEC-RAS),should be consistent with the definition that, underlies its estimation. Achieving this consistency is discussed next for the application to the. Jocassee Dam.

To achieve a compatible implementation of the Xu and Zhang (2009) breach parameter estimates in HEC-RAS, the.Xu and Zhang (2009) median breach failure time (between points A and D) and median breach geometry estimates were input to the HEC-RAS model. The Xuand Zhang (2009) median, peak breach flow rate estimate was: then closely matched by iiteratively changing the orifice coefficient to a final value of 0.1, the breach weir coefficient to a final value of 2.0, and the rate of breach progression relationship between points A and D to the final curve shown in Figure' B.5.

Figure B,5 contains the breach hydrographs obtained by HDR for a piping failure of Jocassee Dam using the Xu and Zhang (2009)-~breach parameter estimates presented in Section BS.5 Specifically, this figure includes hydrographa for the Jocassee headwater hydrograph represented by the blue line (left rscale *,1,000), the Jocassee tailwater hydrograph represented by the brown line (left scale

  • 1,000), and the Jocassee breach idischarge hydrograph is represented by the green line (right scale) at a location immediately downstream of the internal boundary in HEC-RAS model that represents the Jocassee Dam. The, breach progression relationship, which is a required HEC-RAS input, and which was*developed iteratively as 4 'in this report the terinsbreachdevelopment lime and breachformation time are used interchange-ably.

sIt isnoted that, if the breach :development time i~sestimated using a: triangular, hydrograph based on the peak flow rate and Volume of water released from, the reservoir Using Equation 6 (see Section 6.2.8), then the estimated breach development time is 2.5 hours5.787037e-5 days <br />0.00139 hours <br />8.267196e-6 weeks <br />1.9025e-6 months <br />, which corresponds to the time between points B and D on Figure B.4.

P A G 5. B-15

APPENDIX B 1Lb)(7)(F)

Figure 6.5. Jocassee Dam breach progression relationship and breach hydrographs from the HRR (Duke 2013) described in the previous paragraph, is shown by the black line (left scale). Points A, B and D are equivalent to points that are defined in Figure B.4.

The final values of the orifice and weir coefficients of 0.1 and 2.7, respectively, appear to be reasonable in terms of representing flow through the rockfill material and flow through the breach following collapse of the dam crest of the rockfill dam, respectively. In addition the form of the resulting breach hydrograph also appears to be reasonable for a piping failure mode and they closely match the Xu and Zhang (2009) median peak breach flow rate estimate. Point A represents the beginning of the failure time as defined by Xu and Zhang (2009) and is the beginning of the HEC-RAS modeling of the enlargement of the pipe. The breach progression curve was adjusted to keep the flow rate to a reasonably low magnitude prior to the collapse of the pipe and the onset of overtopping that is simulated at point B on Figure B.5. This point marks the end of the breach initiation phase as defined by Froehlich (1995b and 2008). Point D on Figure B.5 marks the end of the breach development phase as defined by Xu and Zhang (2009). The time between points B and D is longer than that estimated by other breach parameters estimation methodologies, but as is discussed in Section 6.5, the longer time is reasonable given the volume of the reservoir contents that must be released while simulating a peak breach flow rate that is consistent with the median predicted val ue.

In our February 2013 report (Ehasz and Bowles 2013) we concluded that the breach hydrograph in Figure 8.5 is a realistic but conservative breach hydrograph, which has good P A GE B-16

APPENDIX B defendablity based on the validity of the Xu and Zhang (2009) method, the conservatie natur of the median breach parameter estimates, a piping failure mode initiating in th{r!¶j(F J the deposition of rockfill immediately below the dam, .the low erosion category of the rockfihl material, and the various characteristics of a modern dam that were included in the design and construction of Jocassee Dam.

P A GE B-17

C:.;;.L;';;.:. .. .. .......... ......... r ..........

",C.FR2 22C'*

Appendix C

-Bench.Marking!/

Comparative Analysis

I.onralns *ecuriry enzsn.ve unlormauu. - WIvfl.uIU Ilumi puUII,. u'I~ou.IU/J,=

puI ,, r-,* 1.JS*.),.

Appendix C.1 Benchmarking Rockfili Dams and Failures

K APPENDIX C.1 BENCHMARKINGICOMPARATI.VE ANALYSIS This Section presents the' characteristics of several large embankment dams and describes the properties and failure conditions and their relevance to-the J ocassee Dam Benchmarking Rockfihl Dams and Failures Some of the large embankment damns that have-failed over the past 50 years are~summarized in the table at the end of this Appendix 0.1. Although none of these dams are directly relevant to the potential breaching of the Jocassee Dam, as given by the characteristics of each dam and as compared to the modern design and character of Jocassee, they are the most closely related examples on record.

Oros Dam - Brazil 1960

  • 116 feet high failed by overtopping during construction
  • Cross-section contained very little rockflhl - just outer zones
  • Contained mostly sandy shell and sandy lean clay core
    • 12 hours1.388889e-4 days <br />0.00333 hours <br />1.984127e-5 weeks <br />4.566e-6 months <br /> to initiate breach and 6.5 to 12 hours1.388889e-4 days <br />0.00333 hours <br />1.984127e-5 weeks <br />4.566e-6 months <br /> to breach and drain reservoir Hell Hole - California, USA 1964
  • 220 feet high failed by overtopping during constr uction
  • Upstream sloping core with rockfill shells
  • Rockfill was dumped rockrfill, no compaction
  • 29 hours3.356481e-4 days <br />0.00806 hours <br />4.794974e-5 weeks <br />1.10345e-5 months <br /> after overtopping initiated 20,000 cfs was passing through .the rockf ill
  • 3 hours3.472222e-5 days <br />8.333333e-4 hours <br />4.960317e-6 weeks <br />1.1415e-6 months <br /> later the rockfill began to ravel and move downstream.

Teton Dam - Idaho,* USA 1976

  • 305 feet high failed by piping during first filling
  • Zoned earthf ill embankment, no rockfill
  • . Pervious rock foundations with voids and irregular jointing
  • Poor core trench design and treatment during construction
  • Piping beneath and through-the core for days or weeks
  • Internal erosion of the core materials leaving large void within core
  • .Core collapsed into the large void and released the r eservoir

=* Once core Collapsed, failure occurred in 2.5+1- hours

  • Failure was confined to- right abutment where core coIlapsed P A GE Cl!-1

o;::.I 3

.Ii~*V ~ - VJILJI ~ ~ ~ J~1 ~n£IUU APPENDIX C.1 Taum Sauk UR Dam - Missouri, USA 2006

  • 100 feet high concrete-faced rockfill dam failed by overtopping
  • Rockfill was dirty, foundations were marginal and slopes were too steep (1.3H:lV)
  • 10 feet high reinforced concrete parapet wall along crest
  • - Operated reservoir with high water levels 8 feet up the parapet wall
  • Poor performance throughout life, large settlements and excessive leakage
  • Overtopping of a 10 feet high parapet wall initiated slope failure and total failure
  • Slope failed anld released the reservoir, it w as not an erosional breach
  • Failure and draining of reservoir Occurred in .less than. 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br /> Tokwe Mukosi - Zimbabwe, 2014
  • e 300 feet high COncrete-Faced Rockfill Dam (CFRD) under construction
  • Rockflll was compacted and slopes were 1V:1,.3H
  • Upstream facing was using cast-in-place curb to form upstream slope
  • Upstream face was-being prepared for concrete facing to be placed last
  • Extreme flooding when rockfill embankment was 60%.complete(200 feet)
  • Water level rose to within 5 feet of existing crest
  • Flood waters passed through rockfill for two weeks without failure,
  • Local downstream rockfill slopes raveled locally
  • When flood waters receded, repairs to slopes were made and construction continued Characteristicsof JocasseeDam (Modern Center Core Zoned Rockfl~l Dam).-

South Carolina,USA

    • 385 feet high central core zoned rockfill dam
  • Protective filter and drain zones surrounding the core.zone
  • Densely compacted rockflll embankment With large rock outer zones and along the toe
  • Widened core zone along the roc*k foundation contact to reduce gradients
  • Grout curtain along foundation and special core material placement along the contact
  • Quality control of materials, and compaction

.- Extensive instrumentation system and monitoring program

  • 40 years of acceptable performance and continuous monitoring P A GE C.-2

u----;I-U--- U-- -L'*

-U -- - -

  • APPENDIX C,.1 A summary of some of the large embankment dams that have failed over the past 50 years olumeBreach-Geomeby (feet) Faue

'an Failure Dam Crest V m E roToop lrePeak Failure Tailue .Flr Oros Brazi 196 o ne 116 2,034 535,100 ME Overtop 118 656 426 541 340,035- 8.5 8.5 Heart

Hoeg US 1964 RockfIt 220 24,800 LE Piping" 185 .574 219 397 259,882 50.0 44.0 6.0 TeoUa97 oi* 305 3,100 288,600 ME/HE Piping 285 780 210 495 2,299,.387 4.0 f.5 2.5 Taukam US 2005 R.wklieI 100 6,562 4,300 ME ,,100 ,289,000 1.0 1.0 Saukwe ____ ___Nobe ____ _____

Tow-Zimbabwe 2014 CFRD 300 1;500 No Breach LE NWA N/A N/A NIA N/A NWA /A NWA Mukos ________ _________ Failure ________ ____ .... ________

NOTES:

11w through and over the rocidill unti failure "The Hell Hole failure was riot a piping failure but was an overtopping of the core and flooding of the rockidil flo "The Taum Sauk failre was caused by a dramatic ten foot overtopping of a parapet wall leading to a failure of the downstream slope and release of the rese~avir.

P.A G~E C,1-3

....... Jr  ;;za ZL~3NIJ a:nnieniro rmar 7L~ 1-- vl--j Appendix C.2 Embankment Design Considerations Affecting Failures

3.-ww..q.i. WJq~~IZ, 3....

3....., .. f. - I .4..r..rgi*V..

... - Uge.Agw L....q ,.w..U$. m ~ *. itt 0lF1

  • rL3O4lbqP J)

APPENDIX C. 2 EMBANKMENT DESIGN The summary of the characteristics of other dams that have failed in recent times, as given in Appendix C.1 clearly outlines the fact that no modern rockfill dam has failed from internal erosion. Oros and Hell Hole dams were both under construction during failure and were failed by overtopping.

Oros Dam Oros Dam was primarily a sand embankment with some rock protection along the outer shells and is therefore not relevant as a rockfill dam and should not be compared to Jocassee Dam since it is not as robust as Jocassee. Oros would be considered a medium to high erodibility embankment due to the fine materials that make up both the core zone as well as the sand materials within the shells. Due to the very wide cross-section erosion and failure took 6.5 to 12 hours1.388889e-4 days <br />0.00333 hours <br />1.984127e-5 weeks <br />4.566e-6 months <br />.

Oros Dam Cros-,,ection uros usm uvertopping 12 hours1.388889e-4 days <br />0.00333 hours <br />1.984127e-5 weeks <br />4.566e-6 months <br /> to Initiate Breach 6.5 to 12 hours1.388889e-4 days <br />0.00333 hours <br />1.984127e-5 weeks <br />4.566e-6 months <br /> to form breach and drain reservoir P A GEC.2-1

APPENDIX C.2 Hell Hole Dam Hell Hole was a rockfill dam, although dumped rockfill, and is the closest example from an erodibility viewpoint to Jocassee Dam. It had an upstream sloping core, and was partially constructed to a level below the adjacent downstream rockfill. The rising waters during the extreme flooding overtopped the lower level core, infiltrated the rockfill and eventually washed out the rockfill in a long and extreme process. The rockfill passed 20,000 cfs of flow for an extended time and with further rising upstream waters the rockfill began to ravel and eventually became unstable, slid downstream due to the excessive flows, formed a breach and failed.

The breaching mechanism of rockfill dams, according to the experimental tests on the rockfill dam breaching process performed at the Technical University in Lisbon, Portugal (Franca and Almeida 2002) as well as the experience and observations at Hell Hole Dam in California, is different from what* is usually described for earth dam failures. The dam failure can be divided in two distinct phases: before the occurrence of the breach, and after the occurrence of the breach. In fact, until the moment when the breach develops, the downstream side of the dam experiences damage due to percolation and erosion due to overflow. The turbulent percolation flow induces slope movements, starting from the base of the flow, in an upward evolution until it reaches the surface of the rockfill. The deg~rading process, before the beginning of the breach, has a two-dimensional character and can be compared with typical landslide occurrences. After the initiation of the breach the flow is concentrated on the rockflll section, an eroded channel is formed in the breach direction, and the control section of the breach moves upwards. The breach cross-section evolution is due, not only to the continuous erosion induced by the flow, but also to the rock slides that occur from time to time when the equilibrium conditions are reduced. The other important facts observed in the tests and at the Hell Hole Dam failure and related to the overtopping failures of rockfill dams are the following:

  • The flow over the dam induces damage on the downstream slope before initiation of the breach and influences the initial breach configuration - this damage is mostly two-dimensional sliding along the longitudinal axis of the dam;
  • When the overflow discharge is enough to induce the initiation of the breach, a major and sudden slide occurs and the initi al breach appears;
  • The overflow induces an initial breach width; however, the deposition of the. rock blocks immediately downstream of the dam has a stabilizing effect, prolonging, the failure process - this is reflected mainly in a shallower final breach depth.

Thus, a rockfill shell embankment provides more resistance to erosion, even during overtopping after the breach is initiated and thus would prolong the timing of the total breach development.

Therefore, the Jocassee Dam, which is truly a rockfill dam, will provide the best resistance to erosion and be considered a low erodibility dam.

P A GE C.2-2

  • lmfmr V~, 3..t .~l.. w ;,uj rlw. ,,FlqrwB~.juvr vw,.aFurrkrfmb r£.1(pawI.uukuuw wu w APPENDX c.2
  • J Hell Hole Dam Plan View 8*C-s1- 4-7 " )

a,,.

460D *b~m .wnd ..

0.e notki .. AA - 0.1I IA.. vedhlh

.The -o*

kr,@ n7e

'S6

.25 . .. .......... Mmi Abmmmb@.WJ-

. .. ... . .... ... . Nq beba. d. 065 mi 4*S1w Hell Hole Dam Crosa-Section PAG;E C.2-3

APPENDI C, Failure of Hell Hole Dam Constuto of Hell Hole Dam on the Rubicon River in Plae County, California began in 1984. The dam failed during construction when the partially completed embankment was overtopped by a flood that was twice as big as the maximum flood of record.

The water emerging from the toe ofth downstream rocklhil shell at 3 pm on December 22, 1964. Some rock has been eroded.

By 7 am on December 23rd, the flow had increased as the reservoir rose behind the dam, and a considerable portion of the downstream slop had been eroded away.

At 9:30 am on December 23rd, a gully had been eroded across the crest of the dam, and the reservoir began to spill over the top of the fill. When this happened the velocity of flow and the rate of erosion increased rapidly, and soon a major portion of the embankment was washed away and the reservoir was emptied.

i -- 4 II At 3:30 pm on December 23rd, there was a gaping hole in the dam, and very little water in the reservoir.

P AGE C.2-,4

APPENDIX C. 2 Teton Dam Teton Dam was essentially a homogeneous earth embankment dam constructed with the local wind-blown silts and sands and was therefore highly erodible. The outer slopes were somewhat protected by a mixture of coarse gravels and sands, which are highly erodible materials. The dam was founded on very porous rock conditions and contained voids and open jointing within the rock formations. Due to the poor design, foundation treatment and construction within the core trench and along the foundation contact, these factors facilitated piping of the core materials into the downstream rock formations. The movement and removal of core materials continued, over a period of weeks and carried large volumes of core materials away from the core zone. This process was focused especially along the right abutment and caused a large cavity to be formed within the core of the danm (Osum 2013). That section of the core eventually collapsed as more and more material was removed and deposited within the rocks below the surface of the dam. This phenomenon was unnoticed during the core removal process. It was only when the removed materials began to fill the downstream voids that the flows exited along surface at the right abutment and began eroding the embankment itself.

The piping flows that carried the materials from the core rapidly increased and large amounts of water and soil materials exited from the face of the embankment. The local staff attempted to intervene by having bulldozers try to fill the developing openings and restrain the development of the openings, but to no avail. With the continued removal of materials the right abutment imploded into the large void that had formed within the core and the crest of the dam dropped into the opening.

This exposed the reservoir; a major breached developed, washed out the right abutment of the dam, and drained the reservoir. The unique undermining of the core by piping materials into the downstream rock voids was unnoticed and eventually formed the large cavity that collapsed.

That collapse of the embankment into the void caused a premature collapse of the embankment leading to the breach. T his premature collapse caused the dam to breach faster than if it Were to form the breach by an erosion process. Thus, from a materials standpoint, and considering the foundation failure mechanism, and the rate of failure, the Teton Dam failure is not comparable to the rockfill materials, rate of erosion, and foundation geology at Jocassee Dam.

P A6 C.2-5

  • j A PPENDIX C.2 010. 01~rl Jo

,~ - a, a.s. 0'? Sane tl.~;. ,.0~d nd r~~"

~ 54.S.c4.1 tOed. Q.*e.. end

~ MOc.Ifoneoo. 1.11 hdn el .0-CeO. 0 on C. 04) 17,* 04-000 0+/-) Ot~loled *tol, ,oeld. Qoete) 0eG CU**itS F'ag.2. Cros-.oectionl through center portion of ambunzknwn.t r'ound.~d on nl]uviurn. I'

- Cres!El 5332 S: ripping...

OS d ro~tatd I*ig. 3. Typicol crosB-3ection over abutment *ectlon* founded on jointed rhyolito.

P AG1E C.2-6

APPENDIX C.2 Taum Sauk Dam Taum Sauk Upper Dam was a rockflll dam with an impervious upstream membrane. It was a dumped rocklill dam designed with very steep downstream slopes of 1.3H:1V and had a 10 foot high parapet wall along the crest. The rockfill was a dirty rockfill, which means the strength of the rockfill was not as high as a cleaner material, such as was used at Jocassee. Although just 100 feet high, it settled as much as two feet along various portions of its four mile length. This settlement had caused much distress to the reinforced concrete parapet wall and it had to be repaired several times during its operating life. Also, as a result of the embankment settlement, the upstream membrane suffered extreme cracking and eventually the entire upstream face of the dam was lined with a HDPE lining to reduce the water losses and improve the stability of the embankment and foundations. During the installation of the lining system a new instrumentation system was installed to record the reservoir levels. Unfortunately the system was not anchored properly along the interior slope of the dam and it moved during reservoir operations. This gave false readings to the operators and allowed the pumps to overfill the reservoir, which resulted in overtopping of the dam. The parapet wall along the crest of the dam was founded on and within the dam crest. The overtopping allowed the water to erode the crest along the downstream foundation of the parapet wall and caused the wall to overturn and fail. The wall failure caused a 10 foot surge of water to rapidly washout the toe of the downstream slope. This immediately caused instability and failed the over-steep slope. Since the downstream slope was marginally stable at 1.3H:1V it failed very quickly and released the reservoir. Thus, the Taum Sauk failure was not a typical overtopping dam breach caused by erosion; but instead it was a slope failure that released the reservoir. Therefore the dam breached very quickly, which is not a representative failure by erosion of a rockfill dam. Thus, the failure at Taum Sauk Dam should not be compared to the material quality, slope configuration or failure mechanism that is postulated for Jocassee Dam. At Jocassee Dam the embankment materials would have to be eroded and thus reduce the section to expose the core to the reservoir and form the open breach that would eventually fail.

1tagM~z~-- -

TYA'CAL W*'E JX~7GV 0? ,5~/ND ROCk

~ _________

Taum Sauk Cross-Section P AG EC.2-7

APPENDIX C.2 Taum Sauk Breach Taum Sauk Breach Taum 3suK Breach P AG E C.2-S

oownuecumy *uwu ImWnVUton - wwunow rum puu uicar per 1(1 WM LJIU(o)

APPENDIX C.2 Tokwe.Mukosl Dam The To,,we-Mukosi Dam in Zimbabwe represents the most recent example, February 2014, of the low erodibiflty of rockfill dams. The project involves the constuto of an 90 m (300 ft) high Concrete Face Rockfihl Dam (CFRD) on the Tokwe River and forming a large resrvi impounding 1.8 billion cubic meters (1.48 million AF): the larest reservoir in the Country of Zimbabwe . The Owner of the project is the Ministry of Water Resources Development and Management Harare - Zimbabwe. W~hile the rockfill portion of the dam construction was approximately 60% complete (200 feet) an extreme flood occurred in the watershed and the upstream water level rose to within 5 feet of the crest of the rockfill. The construction on the rockflll cotnued throughout the flooding of the upstream reservoir and the partially constructed rockfill portion held back the waters while discharging water through the rockfill to the downstream.

Tokwe-Mukosi Dam is a Concrete Face Rockfill Dam (CFRD) under construc'tion. It consists of compacted hard rockfill shell and had an upstream sloping transition rock surface in preparation for the future reinforced concrete facing, when the flood occurred. The dam was partially constructed when the rising waters duning the extreme flooding came within five feet of the crest, infiltrated the rockfill and eventually washed through the rockfill in a long and extreme process. The rockfill passed extreme flows for an extended time (two weeks). With the iong period of extreme flows, portions of the downstem slope began reveling but the rockfill embankment maintained overall stability.

Thus, the Tokwe-Mukosi Dam, a compacted rockfill shell embankment provided high resistance to erosion, even during extreme flows through the rockfill, similar to the Hell Hole example above. The dam withstood extreme flows for several weeks and only experienced local downstream raveling. Therefore, the Jocassee Dam, which is truly a rockfill dam, will provide the best resistance to erosion and can be considered a low erodibility dam.

P A GE C.2-9

¶7f'm '~ V~r ~ 't~ '~'iW ,~1t'~ ff'r j~rr TI? VFf I I ?fff(IEJ APPENDIX C.2 Tokwe.Mukosl Dam Construction of Tokwe-Mukosi Dam on the Tokwe River in Zimbabwe began in 1989. The dam experienced a flood during constuto when the partially completed rockflhl portion of the embankment was subjected to a flood that raised the upsream level to within five feet of the crest.

The water emerging, from the toe of the downstream rockflhl shell on February 2, 2014.

Some rock has been eroded.

By February 4, 2014, the flow had increased as the reservoir rose behind the dam, and even with the extreme water flows through the rockfill it maintained its stability and resistance to erosion.

~Even one week later February 9, 2014, when the flows had reduced, the rockflll maintained its stability and resistance to erosion.

~The construction of the rockfill continued throughout the flood conditions and when the flood receded the rockfill would be restored and repaired.

PAG C.2-1O

APPENDIX C.2 The construction of the rockflll continued throughout the flood conditions and as the flood receded the rockfill was restored and repaired. See the following photos of the various stages of damage during the release of the floodwaters:

P A GE C.2-1l

APPENDIX C.2 P AG6E C.2-12

L.QIIWOn: oeUrUfU *uvWW Uf.rmllUfWon - WWIIImOW ,Vf pUDllc *sIV/OSurw per TO (;;PHL.3UO'0)

Appendix D Detailed Data Supporting Xu and Zhang Revisions

ti-G I I Id ma'm 5~4 lea.

~ .4~0 lit tat itt 5* ~tt Itt tat ii) 31 tat at ~so tat, ad Lit Lit itt 3' a as flit 13. U a..,~ .~ i.O a-'--

I aom 3. tilt I St St *2 3. Li 13. ~

- k41 ail "t4i a.- a-

3. ma rn. Sits sta tat Ia 35 Is

".4.

-I+,* *4* ,

WI 3. I *13 ta¶ ~t tis .is tti tat t'a.. .0 II as WI St a.

Iml~0 #itt af

'.4 .tt> 11 3. -, in.a a- [I a ti -~ U at U 54 Itt itt p Isa

+IIQ ml~lu+ it.

4 31W 3' 15 1, 'at 3, at 13. -

a--

43. insl~
3. - tal.4.

3t 4 ao(+w)11 tit ma 1,4-Vo, 3' 3. tea'n>' 14~ ii° a'*.a ~ a.** t . 6 ( a I 5lint 4.t

-, Wlea*5 ill+.,+ u.;' m 3.

- a-w + NI K

  • ~Mt~ 314 3. 13.4 S4 4

aaWma p.

31W 34- sat.-'

  • 44* 14 3. 3.~t3'~.

a at'

.. w,

-a-

~4 p.

K-K -

ma-

- ma a-

_ i+;ii II+ I g ma*~l qaaW

+t .am,+,, *a.*

.- t ~ -~ 'alt WI -

--- "~ ~s

-~m~l a--.I ~t ~3..4I3 I 141 Om

...... -- " -- " + + Ill I ............. ram, ........  ;

t11 1444 I

- IIG Ira(10!, ISO [ll $3 l4I* #14* 401 #41

  • 418S4 048l~w L&

a-,

aa... 448

  • t4l 34 18~ ml 0*0' Ill ~ 05~ 4~4 49 35 09 CCI 34 CCI 0$ 9044 38~ 18 ~ww 048 me ~ -a 34 00~4 054 m' 4404 *44A 1144 03. 604 404 011 4435 34 004 9414 me 4~WIA WI' Nil Wq 144106W~

154 03~ 654-ml.., 4144 48

  1. ~4WI 1844 1418, OSlO 31 149 04 [Ii] SP0~ W~

I 1*118048.~ 8*1

-a 1413*8

- 4.l¶ 48. NI C 00(41 *4 N 19 Ii. 844 #4 044 43S 31 444 IA 04 5$44 me 031 1141 1141

-a 038*8'

-a

~ 31mq 4,48-s 0401d~W 10*04'

- ##C'~3 '*144 10*1044048184 41 010 0440 015 045 3444 49 044 #44 141 1441 14Cc 41 AC

  • 14 31 34 440 44 44 All 04 44444 C
  • 1414 m  !"

A 118041 6503 031 418. 418. 0.034418418181 4441 040 Il~ 160 '*4 1441 154 dl ~35 34 144 04 4411 h ,*.,,

4WL e: 8. 3 65 8*04 03 4004W 48* $O WIA Is-. -

US. 0461 -44451 -~ SC IC 61 50 4* 044 CI 44, Cot *344 .4

,Ia-A~ ow.

ml 31 44940 01 944 04 1419 0*044* 4*1065 AC 04 1440 034 0651 3' 0*14441151065 $4 III II 044 0 18o 44) Ill i3*1 ' '30' 18018*

I

- ~6581 a 8*4 II 8*0 11841148M*l3 I 0*4034 48103$ 1048651 180*014 465- 8*104 403~44ls44 l0S'0 j 5 ~ 444,4 ~,0414 4,411 4*lpll13 3mO 48-003$ 184 Iv*0*I 03'. .44 34184 '44 w*0 IIWOI _____ 44*8* ~ ~ 4$04*1 udWI 1*65*11

~w. l~ I '.0*3

&034445 IWI'14~ *8*~4*18$ p0l5NQ wIr

~030144 65083 034 * -- ~

  • 8~ 14480.8A65 4483'. 4354 404833015034 NiA3'fr0a444~340142344IT1~444~)15l 344004144 44401 A"0 40~03 ~ 44 44dC64.VA103'IISAPMO 50344144434*4403~ 1303483 018S34TWI 465(3 3~

I-O~)d 3,

e~.q oa 44 44 *1. .4) 3, 044 41 a. 'n0w1 al*~+

I 401----e ip 0,,

p u~ m. u~ '0~4 eer 4W flU 019 I...E.LJ ~3S 3, ~ 1* a. kW4lllll1 m~v~ ~ k~6w *0. 9* 44* II MAO .43, 3, ~* 14* a.

4.113nW) 4*.

I-SI 41* ~l4 3, f~I ,II *94 bebeI+,war

- '-, as. be. -~ Ihot mII 400 Sb*

$4 41 It* ~.* We ~ 34 W4~ 04* *9.

me.w 4-Va-c

  • .O .Im.+
  • 4* *S~~~41 S .0 01* *01 944 90. ~ 3, 09. .ft £4 dO1, lu**t o t eA++ I

+ .~ ib41*

+4n

-a~.o ,0~ *34 me -w 14 0* U 4? 434 3, 0 0* a.

+ l+m wl, 3*

~s0 bm

.~ 4 1* 0 .4 *~0 t34 44 .4~4 90 a.

h~ 3W1 S+am., -~

-~

'~0

-we 0 Ut.

be4Wtl*F7 P. e(* ft 1 4* 44 44 4* ~14 i.1 3, 1~0 1. a. lit

-. 1-c.

4400*1 *40*

440*

  • 4* ~

00 m4~~~

0 9 114 ~0 0

-K

, +

m*

0wAW0140s.~3,MO~V9~k4~43,4 3044*

4*01 0* ~ 14~ Q.d ~iurUpo3401*0 $3,S0wk9~ i0m0~*9* I4W, I~ ~) 3,A~3ff o-Jo'v

  • - -. +j -m . . .. .... m. . . + - ,J - ,* _

1-1 1!114 a m. ma pmlW IlI~ ~ LL52J.~.!..~L.L.~f~] P4 El I m~ I V~I OP~~~)sh~ "4 is his 66K ~ ~e has m ICI £I~ ~ 1461 I Em

- m~

N his Ct.

S E

6 4

1. IV 4.

16.

tI 665 144

  • Its tht ICC Nt 6W dN

~P4 P.

3' Pt

.tt A41 Am itt Lit

~.

t~

~

~

~I ~

a'

~U 4'.

D661N mum 'um~

466 ~ Ash.

-, ~

b.. ~ 3) 666$ ti tA 9 ass ass 946 0 P. 641 a.s 1). is LI

- ~

5~

P.)~11 Iii,

~

- ma~m6 1U4 4W 3' 31 65*1 iiishsi 34661u46446, tiS 6th t44 tE SE t* 11~ 3' t61 114 ~SI 9464 IW~51 ma

~1t6S4bNI.

41b~6Yh96$

- 5115*115651 rfl 31 9~16 @~Wma 554 iS $6~ 66 L4T~ Pt W $4 6~ .isi 'S

~*~1 6.mItsss.

Pt 3~ ~ LE+/-..J 411 511 sAW t4~ iitq s~ ~ is EU 1,3 tiC Ii 6* 5? 91* 35 .115 3' A4~ 111 661 IE -

~*4 1414*11

~

12 I 1~

a a ,~'$s pa" ~.. I

.*~I-~ - I'm 'a 14 is.

m

___ ma

~ma *~ 551164

-w

'55W- ma 1665651

~4~M U6l~3 ma map -

isil

~~u~-'-w Ugh isuiC4Wis, ma ~ 3W) a..

641 ~11 t6m4 0~ ~ ~ *0 *1A3'65 o a~tdvv

igYd

'-'-4

~Nb~U4

&lO 3a*j

3. 543w Nb .4 ~MI Nb

.wmwi

i. Rw4 09 3* It4 Ij SO L S ZOt *Q4 at im Nb~ ~ 1.4 ~o 4, Nb i~ win

&qj q. 3 3 .4

-~ j1d34 9.4 140 t~ 4U1 mwnmn*

Nb in 34 Nb Nb

3. a Ot 4).

U~C .3 0.

- U,. I. 3. 44 ap 34 .0 i* 4)4

-~

F~1 II 3.0 ~U 3.

I4~41 Nb ~ I.. '3. 19 4)? 3, tiC it A.

NW 4~ 3.

43.4 Nb

- ~*4 U.4 .441 .3. 3. 34 U. 13.

mt '

-~ -5. .3. 3, 34 .41 U, C .0 d. 3. ;O . (0 4.

-w¢

.lI.m- *-r 3Ili~,**Ii is Nb 0,

3.,-

13.3.0 K. UNl t UW Nb Nb lul NSa3.3.*

'0 LPite 43 31 34 3.43343.3.

3.34,-,

C at II 4 U 14 14 09,6 .431 TI 0.0 ii 111 U~

] T

  • T ew.

.9-' .4~

~i ,, I,-

3 -

,hie* 3..-. '~Nb' NbA~ __ Nb Nb ammmm**,mm 3.~ 3.

- ~ n:*l ,,too - am. ~j ~ ~14 mw*

Nb Nb I .,,.,. I*

-p -3.

Nb ~ -~

mm*

m9-. 3.33Nb NbNb3~Nb3.3 34WJ~W3.UmV'~B0~Q4W4 W14.

01W 33 ti 449-i G'od u~&vy ~ ~ 34)frC~TW. ~4 O3md mw, ~i m- - - -

ApmD O~ O$7~S~E.S F4~ c33W~4~L3TA13O33 ~ ~ ~33333 31~1 3.i~ESmoHhw~5~S4m~YSA 'En 33.~33 m~wm - ~

313 mcvmi 349 Tm UUa33. Nm

~mm33 IO I I I * ""L,! ,- * -'"I,, - -~ -~

_ 4_I33 I *3 - . .... 2 .. - ~

- ~

~ ____

4' 3 3349 C4*~1 Tm 33 3393* 33~9 3-33373 33-~

49* ~93 L~i [11ii 339 39333 13,mgo34 m ~ 33 w wgm

~gC. USA 34) 3333 34) lIP '~ ~' ~' '~ ~ 3933 ~

3W 3933333~

39'qsw. cNm 41 34 2U 01 139 U U TO *033@

94993 3* 31 3U 134 as' 4~ ~ 3331 0333 33m~mm 3~ 33333 3973 3349w.

33~m 34) ~1, 143 3949 33 3933W3971

- 393? 333 ~

~ USA 41 ~.3 331~ 3* lIP O3~ 349 349 30 9 343 3 3394,9 ~

33m6Ni43 3333 mm~

- - 3d,? 3d,

~4*

333~3 3333 ill 341 13 3314 * ~ 3*1339 U, ~ USA 41 33 3* ~11 3336' 3*

~ .

49334 313 4 - 34 34 M' '~33~ 3334 I £.q3N.

LT]

USA 330 314 31 W CIT V 43433 3)3 W 333 391493q

-34

'37233*3334

~n. ft.

CI 93 334 lI~ 3333 174 33 flIt 443 .33 3 393 4 2334 - - mm, 3* 3913. 3939 ~39ebfi -

T 3~ 39*.

~9~ mm CNm 41 33 933 3* 31 333 '1 '2 93 33Nm39 49 393 3971 '~m~

~33-U, 33~q~w. 1~ 41 1.) 34 3* 33 4' 34 39 43 3* 3* ~,-

333393

~33 21.34mm mm 34 9333* 7mm.

Sf933336 Li b~3 343* ~33 3934 3~W~ 333,349,33 1 3* 3*33 '49 3333 3314 1333 346 13 391 3* 3 .3 ~ p,.'9 mm143 3Nm 3914494, 33k ~ - -

3331'~733 33333 '4 3.3. .~

33343*4 '~

I * '" I i 33*G33

L*a v ama .. if if U 10 34 a. if ~a ~ NI ua. ma

~8~j ai9 199 Wit UA if~ 944 Ul All Ill £994 10 34 ~i4 Ill em 3m,

~34*.4 3. 3

  • 4*~ -

ma I 94 9' 914 10 34 .. o a. 'm0 mama.

£444 twaW £94 £9. 99 10 3. 9. ~4 urn.

ma a - 'ma ," ~9 34 ~* it. 19. ~.£ ,9 Pu -~ AC 'UP m-(.~

ma PUma ma

&~ ~ ~£t ~££ Ca £11 It'll d~

911 & 34 It w~

Ph .. P .. 4~-* ~9.

4'---

U-.,

- -i'--

_ _ _ ' 3 U4W4dU

'9 34 3' 3 *4 A*44in9 PU ma a. K 9 Ia 0~ i. 10 3~ ,4 U 4.

9rag,9.

141 ~ *~ 99,1 941 919 WA 10 3' Ill __ ___ _____

a.

- ~. 1 __

9-

-I .ini *51

~ .~

-WA' 14

~'m~mw I 4

sWa wm~ma ma Pu m19, AWU~E3'39I~3UZM~*U4 ~9~I4

-~ 'ap pm~

  • UK a'9 'ama OW ~9S~U ~W~A t34$3'A34) 3~~GN~9WaU'3 ~UA3' OEM

_-+z*zg __z z: ..... .- _:.... 2... 2-: .- "3: n L- -g ......... .. .......

  • ldij,,.[ll~III**I I~l~L il]*IILV LdP,.....,.JIU.. -- IIIIU Ul~l ...PLJImL. LI**I
  • I i-- --.. I.:

............. *- - --j 5-.. ----- I,lw Appendix E Mark Morris Review

. ...... h ...w t £; nu*..-.m- L..*s.....J. s ,; IlwIl£.IU 2 Appendix E jocassee Dam: Independent review of breach prediction methodology and supporting analyses outlined in the technical report:,

Validation of HRR Breach Hydrograph for Jocassee Dam:

Through an in depth review of the Xu' and Zhang breach parameter estimation methodology. March 2014 Objectives:

An independent review of the work undertaken to validate the approach taken for analysing the potential failure ofthe Jocassee Dam was undertaken and is reported here.* This comprised a review of the technical report (Validation of HRR Breach Hydrograph for Jocassee Dam) and some of the associated / supporting material (as referenced in that report). The review was undertaken by Dr Mark Morris, who has extensive experience of both research .into and industry application of breach analysis methodologies, see attached resume. The following provides a summary of key observations.

Observations:

I Broadly - because of the nature of breach initiation and growth, it is impossible to predict the precise way in which a breach might form. Instead, a best prediction may be made, around which the degree of uncertainty and sensitivity should be examined. This is the aipproach which has been undertaken for the Jocassee Dam failure .analyses, which is consistent with current good practice.

2 There are different degrees to which the breaching process might be analysed, ranging from pure judgement, through the use of equations based on historical failure data, through to more complex predictive modelling. For this analysis, the use of equations based upon regression analysis has been undertaken - and a potential 'flood hydrograph subsequently

'bUilt' from this information. This decision defines the broad approach and hence the

.degree of detail that may be attributed to the hydrograph prediction and the associated uncertainty in the prediction.

3 Over the years there have been many equations developed to .try to predict outflows in the event of a breach. The accuracy of these depends upon the parameters selected and the data upon which they are based (i.e. the types of dam, state of dam, failure mechanisms etc). A significant advance during the past 10years has been a move to incorporate a measure of soil erodibility within both regression equations and predictive models. This is fundamental to predicting conditions associated with parti'cular soil types and condition. The Xu and Zhang equations are the first time erodibility has been built into such equations, and are therefore considered current state of the art for this type of analysis (i.e. for using regression equations to predict'breach failure).

4 Validation of regression equations can be undertaken by comparison against real events, controlled events and predictive models (that mnight be considered to more accurately reflect the breaching process)., In the Jocassee study, an analysis of the development and validation Mark Morris i4i' April 2014 Markmorrissamuifrance.com Page E-I

,

  • Appendix E of the XU and Zhang equations was undertaken. This analysis was extensive, covering the nature and quality of the base data used, as well as the method for equation development. This review was undertaken 'around the table' with the originators of the work, including Prof Briaud upon Who's work the categories of erosion used were based. It is difficult to see how a mor'e thorough review of the basis for the equation~s could have been undertaken.

5 Inclusion of material erodibility within the regression equations is a key advan~ce, but then requires assignment of values of erodibility - in this case, high-medium-low, to appropriately represent the material type and state. The review by Prof Briaud addressed this important asPect, and provided independent assessment of the likely erosion :category for Jocassee. This approach is consistent with industry good practice for breach analysis.

6 In addition to checking the Original data and developmen~t of the predictive equations,.new equations have been developed using openly accessible case data (iLe. excluding Chinese data which is not available outside of China). This remoyes any uncertainty relating to the quality of this data (even though that issuewas addressed through careful consultation). Tlhe results from the new equations are :broadly consistent with the earlier predictions.

7 Having undertaken ~an extensive assessmentof the regression analysis methodology -

including development and testing of revised equations based Upon openly accessible data -

it is worth remembering that there are practical limitations to'the accuracy with which any regression equations can predict the breaching process. These have been carefully considered and discussed in the report; if a more detailed analysis of the potenitial processes is required then it* is likely that this would only be achieved through undertaking more complex predictive modelling.

8 The approach adopted for prediction of the flood hydrograPh makes use of the NEC RAS flow modelling software, within which there is a module designed to simulate growth of a

.breach and the associated production of a flood .hydrograph. The approach has been to use parameters predicted by the Xu and Zhang equations as input to the HEC RAS breach module, and to adjust various breach parameters slightly to match the peak discharge predicted from the HEC RAS model *to the Xui and Zhang equation. This approach is sensible and allows the creation of a realistic-and representative flood hydrograph. There are likely to be some variations in the hydrograph descriptors in comparison to the regression analysis, since the two approaches accommodate different parameters. However, these differences should be within the typical ranges Of uncertaintY as'sociated with: breach prediction. Of all the parameters describing a breach flood hydrograph, the peak discharge is probably the most reliably predicted, hence tying the t~vo methods via the peak discharge value and ensuring that the hydro gr'aph volume matches the resei'voir stored volume helps to limit uncertainties.

==

Conclusions:==

The steps taken here to validate use of the Xu and Zhang regression equations* for breach prediction have been very detailed and thorough. It is hard to see how rnoredetailed analyses could be undertaken to support the recommended results without stepping from the level. of regression analyses into more complex predictive breach modelling. The key aspects of (i) basis for the equations and (ii) representing the material erodibility-have both been addressed in. detail.

Makmorrls~samuifran.ce.om

,~Page E-2

Appendix E Mark W Morris Director Company Samui France SARI Profession Chartered Civil Engineer Speclailsatlon Flood risk analysis (Dam and river engineering)

Emergency planning YaofB rtr t6 I PJroiecLmna*,lement / Research coordination Key Qualifications

  • Dam and Embankment Safety - Dam-break, Embankment Breach, Risk Assessment and Emergency Planning - 20 years experience in dambrcak analysis techniques, darn sfafety risk assessment and breach formation prediction at National and International levels supporting the development of emergency action plans. Studies include national and international research into fundamental processes and modelling tools,.

prioritisation of operational and research needs ats wvell as consultancy studies, a Flood Defence and Flood Risk Assessment - 25 years experience in conducting river engineering studies including desk, feasibility, design and environmental studies of river channels, hydraulic structures and flood plains. Experience in the assessment of flood risk, construction risk and the safety of hydraulic structures.

Particular experience has been gained in the risk assessment of weirs and dams leading to fiailure of the structures and the analysis /prediction of breach develoPment through emban~kments.

  • Project management, research coordination, training, technology transfer and dissemination -20 years experience in the management,, co-ordination and implementation of international research projects, including various EU funded projects under FP4, FP5, FP6 and FP7. Experienced in the provision of technical courses, workshops and conferences on practical hydraulics and river, engineering and in dissemination of research findings and applications to industry through production of industry, guides, workshops and conference events.

Specialist expertise in the development of wveb based tools and methods facilitating technical project management. and project communication and dissemination.

Career Summary 2011 - present Director, Samui France SARL 2001 - 2011 Principal Engineer, Floods Group, FIR Wallingford 1988 -2001 Graduate to Senior Engineer, Various Groups, HIR Walllngford 1987 - 1988 Graduate Engineer, Potable Water Dept., Sir M MacDonald & Partners, Cambridge Education and Professional Status PhD Breaching of earth embankments and dams. The Open University, 2012 BEng Hons (1st Class) in Engineering Science (Civil), Exeter University, 1987 Member of the Institution of Civil Engineers, 1993 Member of the Chartered Institution of Water and Environmental Management, 1993 Member of the British Dam Society Committee. 1999-2001, 2001-2005. 2005-2011 Member of the Reservoir Safety Advisory, Group, 2007- present Referee for journal publications including ICE and ASCE, 2006 - present Member of the editorial committee for the BDS Journal of Dams and Reservoirs. 2008 - present Member of the ASCE/EWVRI task committee on dam / levee break fluvial processes, 2008 - 2012 Languages Speaking Reading Writing English Mother tongue Mother tongue Mother tongue French Good Good Reasonable IISmui F~rance Page 1 's 2, Page E-3

nra,[l@ll, *.;aInI 1*~lllt eIguluglwl2-..l - .V.lleIA. Im.... .... t:: .............. Riie~'-

AnAnnRlxl I Mark W Morris Current Practice Mark Morris is Director of Samui France sari, an independent consultancy established in France (Haute Savole) focussing upon specialist research and consultancy supporting management of the environment, with a particular focus upon water. The corc areas of work include specialist consultancy relating to reservoir safety, dam and levee performance (breach), and flood risk analysis and management.

In parallel, Mark collaborates extensively on European research projects, undertaking technical roles, project coordination and project communication and dissemination activities. Samui France, in conjunction with its sister company in the UK (Samui Design) develops web based tools and systems to support collaborative working and technical project communication and dissemination.

During 23 years of working at HR Wallingf'ord, Mark developed world leading expertise in dam and levee breach analyses, leading to the development of the HIR BREACH model, and supporting the more recent AREBA and EMBREA models. EMBREA arose from Mark's recent PhD) studies in'to breach modelling. Mark WaS deputy coordinator of the European FLOODsite project, which supported implementation of the European Floods Directive. Within this project Mark also managed technical work on flood defence failure modes, and levee breach, much of which now underpins the fragility curves used to drive the UK Environment Agency system risk models. Mark also managed the FRMRCII work package relating to rapid breach-model development (AREBA).

Selected Dam and Levee Projects 2009 - 201!3 EUROPEAN FLOODPROBE. PROJECT European research investigating specific processes associated with urban flooding and levee performance. Specific research forievees includes the analysis of internal erosion processes, the performance of vegetation and the use of remote data for reliability analyses 2012 DAMBREAK ANALYSIS FOR THE WLOCLAWEK DAM (VISTULA RIVER, POLAND)

Provision of expert advice to ARUP UK and ARUP Poland for the analysis of potential failure modes, breach and dambreak simulation for the Wloclawek Dam, River Vistula, Poland.

2011i- 2012 SMALL RESERVOIR RISK CATEGORISATION With risk based reservoir safety legislation being introduced in England and Wales this project, commissioned by Defra, provided guidance and a simple risk assessment methodology aimed at owners of small reservoirs such that they could assess the risks posed by their existing or planned small reservoirs and hence take steps to minimise those risks through design and / or operation.

20!1 -2012 A GUIDE TO RISK ASSESSMENT OF RESERVOIRS Following the earlier seoping study, development of a framework- and recommended tiered approach for risk assessment for reservoirs in England and Wales. The project develops the methodology and produces industry guidance which builds upon the earlier Interim Guide and CIRIA Guide to risk assessment, including current international best practice.

2009 - 2010 DAMBREAK ASSESSMENT AND EMERGENCY PLANNING FOR KIO KHlO MA DAM, THAILAND Provision of expert advice on dam failure, flood routing and mapping, flood impact analysis, risk assessment and emergency planning for the Thai Kio Kho Ma Dam.

2008 -201i1 FLOOD RISK MANAGEMENT RESEARCH CONSORTIUM- FRMRC2 Task leader within the Infrastructure work package, developing a simplified breach model for use within system risk / reliability modelling.

2008 - 2011 INTERNATIONAL LEVEE MANUAL Member of the UK steering committee for the development of an International Levee Manual, providing detailed guidance on the design, construction, maintenance and operation of flood levees.

1.Samul 1rancePae2IAiO4 Page E-4

Mark W Morris Appn~ndix F

  • 2008 RESERVOIR TNUNDATION MAPP[NG (RIM) PILOT APPLICATION Trial application of the RIM methodology to selected dams, highlighting issues with the proposed methodology. Undertaken in partnership with Atkins.

2008 RESERVOIR INUNDATION MAPPING (RIM) METHODOLOGY Expert guidance offered on methodology development as part of the project Quality Review Team.

2008 INTEGRATION OF THE HR BREACH MODEL AND THE INFOWORKS RS FLOW

, MODEL

\- The HIR BREACH predictive breach model was integrated into the InfoWorks RS flow modelling package providing the first truly integrated commercial breach and flow modelling package.

2007 -2009 DAM SAFETY INTEREST GROUP BREACH MODELLING PROJECT Participation in this international R&D project aimed at reviewing, evaluating and developing a predictive breach model for industry use. Participation as developer of the HR.BREACH model and evaluator of models.

2007-2008 DEVELOPING A STRATEGY AND PRIORITISED PROGRAMME FOR RESEARCH SUPPORTING UK RESERVOIR SAFETY To review existing programmes of research supporting reservoir safety, develop an appropriate short and long term research strategy for the UK and to provide a prioritised list of recommended actions. This project supports the research programme being established by the Environment Agency through the Reservoir Safety Advisory Group. The research also considers different modes and sources of funding to support the research.

2006 -2009 MODELLING EMBANKMENT PERFORMANCE (HR BREACH MODEL)

Second stage development of the HR BREACH model through detailed analysis of IMPACT project data and additional research via the FLOODsite project. This development project will enhance the accuracy and capabilities of the HIR BREACH model for use in predicting breach growth through embankment dams and flood defence embankments.

2004 -2009 EUROPEAN FLOODSITE pROJECT - TASK 4 (FAILURE MODES) AND TASK 6 (BREACH MODELLING)

Task Leader for FLOODsite Tasks 4 and 6 investigating failure modes for flood defence structures and breach initiation and growth processes.. Outputs included a definitive collation of failure modes for use in reliability analysis, along with a state of the art review and development of predictive breach models.

2004 - 2009 EUROPEAN FLOQOSITE PROJECT - INTEGRATED FLOOD RISK ANALYSIS AND MANAGEMENT METHODOLOGIES Project Manager for the FLOODsite Project, for which HR Wallingford is the Co-ordinating organisation. FLOODsite is a European Commission Integrated Project under the Sixth Framework Research Pr'ogramme comprising an extensive programme of research and application aimed at developing, drawing together and implementing an integrated European methodology for flood risk analysis and management. The project team comprises members from, some 36 organisations drawn from 15 different countries with a total project value, of

,-E14M.

I ISmwui [r'8otC Page 3 I5 Apri 2OI4 Page E-5

Mark W Morris Apnli Selected 'Publications Morris, M.W. (2011) Breaching of earth embank~ments and dams. PhD thesis. The Open University.

Morris, M.W., Hassan, M.A.A.M., WahI, T.L., Tejral, R.D.,Hanson, G.J. and Teimple, D.M. (2012)..Evaluation and development of physically based embankment breach models. FLOODrisk2012 conference, Rotterdam, Netherlands. 20-22" November, 201'2. .. ...

Van Damme, M., Morris, M.W., Borthwick, A.G.L. and Hassan, M.A.A.M. (2012). Rapid embankment breach modeling. FLOODrisk2012 conference, Rotterdanm, Netherlands. 20-22" November, 2012.

Tounnent, R., Morris; M.W. and ROyet, P. (2012). Levee failures related to structure transitions: typology, levee performance evaluation and improvements. FLOODrisk2012 conference, Rotterdam, Netherl~ands. 2 0 -22nd November, 2012.

Morris, M.w., Hassan, M.A.A.M. andvan Damme, M. (.2012) 'Recent impro~vements in predicting breach through flood enmbankments and embankment dams'. British Dam Society ! 7t* Biennial Conference, University of Leeds. 12 -15 *' September, 2012."-

Morris, M.W., Wallis, M., Brown, A.J., Bowles, D.S., Gosden, I, Hughes, A.K., Topple, A., Sayers, P.B. and Gardiner, K. (2012) 'Reservoir safety risk assessment - a new guide'. British Dam Society. 17lIh Biennial Conference,,University of Leeds., 12-i.5 September, 2012.

Morris, MW.W, Goff, C. and Simm, J.D. (2012) "Current European research relevant to reservoir safety: the FloodProBE and UrbanFlood projects'. British Dam Society 17"' Biennial *Conference, University of Leeds. l2-15"' September, 2012.

Samuels, P.O. and Morris, M.W. (20.102 'ldealised model for flow towards a dam breach', FirSt European DiiinIAHR Congress, Edinburgh. 4.6" May, 2010.

Samuels, P.G., Morris, M.W., Sayers, P;B., Creutin, J.-D., Kortenhaus, A., Klijn, F., van Os, A., Mosselman, E.

and Schanze, J. (2010) 'A framework for integrated flood ,risk* management', First European, Division iAHIR Congress, Edinburgh. 4-6lIh May, 2010. . .., ..

Morris, M.W. and Hassan, M.A.A.M. (2009) 'Breach *modelling research into practice: ConclUsions from the HR Wallingford & European FLOODsiteProjeets', ASDSO Dam Safety 09, Hollywood, Florida, US2009.

Tagg, A.F., Morris, M.W., Lumbroso, D.M. and Di Mauro, M. (2009) 'Improved .Emergency Planning and Evacuation through the use ofra Loss of Life Model', A SDSO Dam Safety 09, Hollywood, Florida, US, Simm, J.D., Morris, M.W., Gouldby, B.P.. and Sayers, P.B. (2009) 'Levee fragility and breach growth analysis',

ASFPM Conference 2009, Orlando, Florida, US, Morris, M.W., Hassan, M.A.A.M., Ghataora, 0.5. and-Samuels, P.O. (2009) 'Breach formation: Identifying~key physical processes to support improved breach numerical modelling', 33rd IAHIR Congress, Vancouver, British

Colombia, Morris, M.W., Hanson, 0.1. and Hassan, M.A.A.M. (2008) 'Improving the accuracy. of breach' modelling: why are-we not progressing faster?' Journalof FloodRisk Management, Vol. 1 (No. 4), pp. pp. 150-161.

Morris, M.W. (2008) 'IThe impact of dambrealc - managing the* risks', Dam Safety'Management 2008, Nanjing, China, 22-24th October, 2008.

Morris, M.W., Hassan, M.A.A.M, Kortenhaus, A., Geisenhainer, R, Visser, Pi. and Zhu, Y. (2008). Modelling breach initiation and growth. FLOODrisk 2008 conference, 30*? September- 2" October, 2008. Oxfiord, UK Morris, M.W., Hughes, A.J. and Buiijs, F (2008). Dambreak and emergency planning: Meeting end user needs.

British Dam Society 15"' Biennial Conference, Warwick, Sept 2008.

Morr'is, M.W., Hassan, M.A.A.M., Samuels, P.G. and'Ghataora, G.S. (2008). Development of the HR BREACH model for predicting breach growth through flood embankments and embankmhent dam~s. Piverflow2008 International conference on fluvial hydraulics, 3-5"' September, 2008. lzmir, Turkey.

Morris, M.W.,,Hassan, M.A.AM., Buchholzer, Y. and Davies, T. (2008). HR BREACH: Developing a practical breach model to meet industry needs. us Society on Danm.s 28"' Annual Meeting and Conference, April 28"' -

May 2 "d, Portland, Oregon.

Mor'iis, M.W., Hassan, M.A.A.M and Vaskinn, K.A., (2007). Breach forrmation: Field tests and laboratory experiments. Journal of Hydranlic Research, Volume 45, Extra Issue (2007).

II *amui frange Page 4 15'Ar*0O)h Page E-6