ML16070A288

From kanterella
Revision as of 04:20, 5 February 2020 by StriderTol (talk | contribs) (Created page by program invented by StriderTol)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Jocassee and Keowee Dams, Breach Parameter Review, Dated April 24, 2013 (Redacted)
ML16070A288
Person / Time
Site: Oconee  Duke Energy icon.png
Issue date: 04/24/2013
From:
NRC/OCIO
To:
Shared Package
ML16070A295 List:
References
FOIA/PA-2016-0071
Download: ML16070A288 (106)


Text

(lL l3 I tO/* IL *Wrilunl Ii WI1 UIIUIU*UI* IU IVIl- I,131 Or.. IV, WII*II Ib

  • ublicly available).

JU IIWW W.........

,+am:+,+..t,,,.*i*

........... ___..* ......... ,*,..,= n* *,..,.,,++.

  • ENCLOSURE 1 Jocassee and Keowee Dams, Breach Parameter Review

'll'u,.,I.,lu lllul ......iJ*i*. ,;;*-,..; .............. 1.., I*F'iP'.Fi_ _"l*'Gl"l JOCASSEE AND KEO WEE DAMS ,1 Breach Parameter Review February 2013 By S Joseph L. Ehasz, P.E.

/ . David S.Bowles,P.E.

......... t;St ,,t, Lo.O t.;i m.'.v.m...

. vm Jocassee Dam - Breach Parameter Independent Review Joseph L. Ehasz, P.E., URS Civil Construction & Mining Dr. David S. Bowles, P.E., RAC Engineers & Economists 1.0 Scope of the Independent Review The scope and deliverable for this review was stated as follows in an email, dated December 11, 2012, from Mr. Dean Hubbard, Duke Energy, to MVr. Joseph Ehasz, URS Civil Construction &

Mining.

Scope of.the independent review: Provide an independent review of the postulated breach parameterassumptionsfor the Jocassee dam, and the Keowee reservoirdams and dikes to be used as inputs for routing of flood waters with 1-EC-RAs and SRH-2D.

The independent review would determine if the breach parameters are realisticand appropriatelyconsider the dam/dike designs, construction, materialsand failure progressionfor the assumedfailure mode. The Jocassee assumedfailure mode is a piping failure and the Keowee reservoirdams and dikes assumedfailure mode is overtopping. The breach parametersalso need to be considered currentstate of knowledge and analyticalmethods (50.54Wf Letter requirement) and therefore defendable in an NRC review as being realisticbut conservative.

Deliverable: Independent initial review of the breach parameterassumptionsfor the Jocassee dam and Keowee dams and dikes with verbal report by conference call by 12/20/12. Independent review written summary with any recommendationsfor breach parameteradjustments to be submitted by January 15, 2013. The assessment should include a review of. the validity of.the model used (Xu Zhang 2009) and any other model that would provide more realisticbreach parameters.

Sections 2.0 - 6.0 focus on Jocassee Dam for an assumed piping failure mode and Section 7.0 contains a brief review of the failure of Keowee Dam asthe result of upstream failure of Jocassee Dam.

Regarding the requirement that the breach parameters are to be defendable in an NRC review as being realistic but conservative, we cannot predict the outcome of an NRC review but we have based our review on our engineering expertise and specific knowledge of Jocassee Dam.

Page I2

The following materials were provided by Duke Energy for this review:

1. FinalBreach Data Matrix Table - containing a comparison of a) the breach parameters and related attributes for the "100 Wilson Case 2" and b) a range of breach parameter estimates and related attributes based on the XU and Zhang (2009) regression method for Jocassee Dam.
2. Xu Zhang Breach Data - containing a range of breach parameter estimates and related attributes based on the Xu and Zhang (2009) regression method for Jocassee Dam.
3. Jocassee Main Dam Design, Construction and PerfOrmance, Report to Design Engineering Department, Duke Power Company, Charlotte, North Carolina, by George F.

Sowers, April 1987.

4. Xu, Y. and Zhang, L.M., 2009, Breaching Parameters for Earth and Rockfill Dams, Journal of Geotechnicaland GeoenvironmentalEngineering, 135(12): 1957-1970.
5. An Excel Workbook Jocassee BEP LE-ME Hydrographs Final containing HEC-RAS breach hydrographs for Jocassee Dam.
6. An Excel Workbook Final_BreachData_Matrix- 02082013 containing revised final breach parameter estimates based on the Xu and Zhang (2009) regression method and a summary of HEC-RAS inputs for Jocassee Dam.
7. Video clips from HEC-RAS for Jocassee Dam breach with low and medium erodibility.
8. An Excel Workbook Keowee Dam Breach Parameterscontaining KeoWee breach parameters.
9. An Excel Workbook Keowee Breach Hydrograph - HDR BEP LE containing HEC-RAS breach hydrographs for Keowee Dam.
10. Video clip from HEC-RAS for Keowee Dam breach.

In addition, we obtained a copy of the complete January 2010 Ph.D. Thesis, "Analysis of Dam Failures and Diagnosis of Distresses for Dam Rehabilitation", by Dr. Xu Yao from The Hong Kong University of Science and Technology.

Page I 3

2.0 introduction This independent review was performed on the Jocassee Dam postulated breach parameter estimates and underlying assumptions by Joseph L. Ehasz and Dr. David S. Bowles with assistance from Drs. Loren Anderson and Sanjay S. Chauhan. The review focused on the potential piping breach parameters for the Jocassee Dam based on the Xu and Zhang (2009) regression equations. The overtopping breach of Keowee Dam as the result of the failure of the upstream Jocassee Dam is discussed in Section 7.0.

Although review of potential dam breach parameters is the focus of this report, it is important to note that the physical features of the Jocassee Dam design and construction strongly influence the reality of any dam breach potential. Therefore, this review begins in Section 3.0 with a summary of some important physical features of the Jocassee Dam. We then evaluate if piping should initiate, would detection and successful intervention be likely to prevent a failure in Section 4.1, whatpiping failure modes might apply to Jocassee Dam in Section 4.2, and some general breach parameter considerations in Section 5.0. In Section 6.0 we evaluate, using the "state of knowledge," what are the appropriate breach parameters for Jocassee Dam? In Section 7.0 important features of Keowee Dam are summarized and the proposed breach parameters for Keowee Dam are reviewed. Conclusions are summarized in Section 8.0 and recommendations are listed in Section 9.0.

Appendix A contains descriptions of potential piping failure modes for Jocassee Dam. Appendix B contains breach parameters estimates from our application of the Xu and Zhang (2009) method to Jocassee Dam with a comparison to HDR mean estimates.

3.0 Background on Jocassee Dam Even before considering the potential Jocassee Dam breaching and establishing the appropriate breach parameters it is instructive to discuss the design and construction of the Jocassee Dam*

The following statements refer to the report entitled, "Jocassee Main Dam Design, Construction and Performance", by George F. Sowers, April 1987, and are significant to dam performance.

  • The dam was completed in 1967 and has been continuously monitored and has performed very well to the present. Even though the dam was designed and constructed in the mid-1g60's it has all the modern and defensive measures of the rockfill dams designed and constructed today. See Figures 1 and 2.
  • Beginning at the rock foundation level, th (b)(7)(F)

(b)(7 (F)

Page 14

lAr~.hk.d~4 ~ p~b'~t~ d:uilsurv ~J:. 1CQFfl Z.3~3 Figure 1. Google aerial view of Jocassee Dam.

I:))(7)(F)

Figure 2. Jocassee Dam cross section (Sowers 1987).

In addition, in order to decreas the hvdrauIi Rradientsao aI p*ile tecr zone wa*(°()F Page I 5

offset a reduction in horizontal stresses caused by deflection of the dam 1 1 1 I~b)(7(*) !This ensures that the the foundation contact. See Figure 2.

  • In order to protect the core materials from internal erosion and material mo~vement and potential piping of the core°x)F (b)(7)(F)

(b)(7)(F) See Figure 2.

  • In order to establish a dense rockfill (b)(7)(F)

I(b)(7)(F) ]This process produced a very strong and dense rockfill and a very stable rockfill embankment zone.

  • Quality Control: selection of materials and documentation was enforced by the Resident Engineering staff and maintained as an important function during the construction. As indicated above, the, selection and placement of the various zones were carefully done so as to maintain the compatibility of adjacent materials to eliminate migration of materials and maintain a stable embankment. Grain-size and density testing to verify materials and compaction were conducted at intervals to verify and maintain control of the placements. Field inspection was maintained during construction with Duke Engineering staff observing and interfacing to ensure the design intent was maintained during construction.

All of the above facts are important when considering the potential for internal erosion and piping at Jocassee Dam. The materials and features employed during design and construction, as described above, were all designed to minimize the possibility of piping and failure of the embankment. Thus, it is even difficult to envision the development of a piping condition at the Jocassee Dam, especially given the defensive design measures incorporated and with the past 45 years of excellent performance. However, a deterministic approach is being used to postulate a sunny day piping failure for Jocassee Dam. In Section 4.0, the potential for a piping failure of Jocassee Dam is discussed before discussing breach parameter considerations in Section 5.0 and reviewing the proposed breach parameter estimates using the Xu and Zhang (2009) method in Section 6.0.

Page 16

4.0 Dam Failure Considerations 4.1 Piping Failure Mechanism Given the description of Jocassee Dam design, construction and years of good performance in Section 3.0 it is very difficult to envision a "piping failure" through the main Jocassee Dam embankment. In addition, we are not aware that there has ever been a piping failure of a modern rockfill dam anywhere in the world.

For piping to occur, the following conditions must all exist:

1. there must be a source of water and a flow path,
2. there must be an unprotected exit for the eroded material,
3. there must be erodible material in the flow path, and
4. the material must support a roof for piping to enlarge and propagate.

The piping phenomenon within a dam must originate with internal erosion and material movement somewhere within the dam, perhaps at the foundation-core contact, and exit downstream and progress all along the foundation contact to daylight or to atmospheric conditions along the toe of the dam. The flow of water and materials must have an exit, to which it can carry materials and then progress Upstream along some erosion path and move materials from upstream; thus, the formation of the "piping phenomenon"'. With increasing movement of large amounts of water carrying materials, the flow would eventually form a path within the downstream rockfill portion of the dam. Ifthe process continues and the flows increase, it would eventually engage a larger and larger portion of the rockfill and eventually form a raveling condition within the rockfill large enough tormake the downstream shell of the dam unstable. If it becomes unstable enough to move rockfill downstream or to cause pockets through collapses, it could then expose the core, which is the water retaining structure of the dam for the upstream reservoir. If support is removed from the downstream side of the core, it would become unstable and partially collapse. The breach of the dam would progress as it overtops the core~and forms an overtopping breach and failure of the dam. This is considered the start of the "breach development phase" as discussed in Section 5.0.

The defensive measures within the Jocassee Dam are designed, constructed and incorporated erosion potential. To further defend against erosion and material movement, filters and a drain were specifically designed to eliminate material particle movement from one material in the embankment section through another and progressing downstream. Specifically, the filter Page I 7

gradation was designed to eliminate core material particles from moving through the filter and the gradation of the drain materials was designed to eliminate filter materials from movinR through the drain. In addition, the construction specifications were detailed such that'lb)(7)(F)I (b)(7)(F)

(b)(7* (F) All Of these measures essentially eliminate the potential for migration of materials and internal erosion of the dam materials; and hence, prevent a piping condition from forming.

Thus, an embankment piping failure of the Jocassee Dam is extremely unlikely, either deterministically or probabilistically.

However, if one hypothesizes that "piping develops along some hypothetical path," then one can ask, "What would be the conditions of a failure?" Given the above defensive measures, piping would be a very slow and detectable process; with very likely enough time fr intervention. In the event of piping initiation, emergency action could be taken by~T()'

(io)(7)(F)

(b)(7)(F) IThe condition would be observed and immediately considered unusual and serious enough to be studied, evaluated, and appropriate emergency action taken.

Given the fact that th (b)(7)(F) lespecially along the downstream portion, the stability of the downstream shell will be maintained even with considerable flow through the rockfill. Experience shows that rockfill can support considerable flows and still maintain stability. A study by Leps (1973), entitled "Flow Through Rockfill," has presented several cases of actual high flows through rockfills. At Hell Hole Dam in California over 20,000 cfs passed over and through a rockfill embankment dam without distress. ln addition to simply passing the flow, it is essentially impossible to form a "*pipe or tunnel" within the rockfill without seeing it, since the structure would collapse and block any formation of a "pipe". The flow may cause a raveling or movement and adjustment of the larger rock materials; however, it would not wash out the rockfill completely and expose the core very rapidly. Thus, it would be a long process and provide time to intervene by lowering the upstream water levels and reducing the reservoir storage. Once again, even in the hypothetical case of piping in a rockfill dam, there would very likely be time to intervene, significantly reduce the chance of dam failure, and reduce the outflow discharge and effects on the downstream flooding conditions.

4.2 Potential Piping Failure Modes for Jocassee Dam The information and discussion in Section 4.1 relates to a piping failure of the main or general sections of the Jocassee Dam embankment that would involve gross movements, and complete Page 18

  • -....... -^^.,rn ---on-i....o ,-nr~rml~imln failure of the dam. Earlier Potential Failure Modes Analyses (PFMAs) have investigated other sections of the dam and abutments for alternate potential piping conditions. In a PFMA, which was facilitated by RAC Engineers & Economists and included engineers from Duke Hydro and HDR, all 28 initiating mechanisms included in the Piping and Seepage Toolbox (Reclamation-USACE-URS-UNSW 2008) were considered for their applicability to Jocassee Dam. In addition, the PFMA reviewed potential failure modes identified and categorized in a PFMA conducted by Findlay Engineering (2004) for submission to the FERC, The following three piping failure modes were identified and categorized as being credible for the Jocassee main embankment dam in the RAC PFMA:
1. JPFM 5: Piping in thelbT)F
  • area at approximately Elevation 1020 ft.

msl!

a. JPFM Sal: Piping through the foundation (natural dam) in th*(x)F
b. JPFM 5a2: Pip~ing through the foundation near)(F th (b)(7)(F)III
c. JPFM Sb: Piping through the foundation (Natural Dam) at the interface between the weathered rock in the abutment~and the Core material.
2. JPFM 4: Piping through the rock foundation in the[ I cr I
3. JPFM 3: Piping through embankment.

Each of these failure modes is described in the Appendix A.

The most likely ("least unlikely") dam piping failure mode in thai*)F lis piping .

truhthej*7*F) I(JPFM 5ai).I"(7cF) I piping through th*[bl( fjF j of the main dam (JPFM 4) is a much more unlikely piping failure mode and main* dam embankment piping is extremely unlikely for the reasons described in the Sections 3.0 and 4.1 of this report.

The normal maximum operating level for the Jocassee Reservoir is Elevation 1,110 ft. msl. The reservoir operating rule is designed ,to keep the reservoir at or below this level for all but relatively rare floods. Historically the reservoir has never exceeded Elevation 1,110 ft. msl, although the annual peak reservoir level has been within a foot of that elevation in many years during its 45-year life. It is estimated that for the Jocassee reservoir pool tO exceed Elevation 1,110 ft. msl. would require a major flood of the order of the 1 in 200 AEP or rarer.

.Page 19

5.0 Breach Parameter Considerations When considering the piping failure of a dam it should be recognized that the seepage/erosion/piping process, which is the first phase (breach initiation) of the breach process (Wahi 1998), takes considerable time, as discussed in Section 4.1, especially if the embankment is well protected as described for Jocassee Dam in Section 3.0. However, the breach failure times that are the focus of this review are the second phase (breach development) or the time that the embankment would take to washout after the internal erosion process (piping) advances far enough to form a cavern within the downstream shell leading to a collapse of a portion of the downstream shell that exposes and results in a partial and progressive collapse of the core, exposing it to overtopping. The overtopping would then washout the embankment. Therefore, there would be expected to be considerable time available in the early phases of a piping process (phase one, or breach initiation) to intervene and take action, especially with the defensive measures that are designed into Jocassee Dam.

Figure 3 is adapted from the Xu and Zhang (2009) paper and illustrates the distinction between the two phases of the breaching process as defined by Xu and Zhang (2009): breach initiation and breach development. Outflow during the breach initiation phase is small, and in the case of a piping failure it is a flow through a developing pipe or seepage channel. In the breach development phase, the outflow and erosion develop more rapidly especially after initial collapse of the core.

80000

  • C A:, Outflow rapidly Increased

--- 6 0 0 0 0 - IasB: C: Dam Peak crest collapsed outflow ID: ,' Breach fully formed WBreach Initiation Breach Develo m etas u hs (Xu and Zhan ,eint"

- 20000-ABE O t 10 a~m. 11 12 13 p~m. 14 15 16 Time (hour)

Figure 3. Definition of breach initiation and breach development phases in Xu and Zhang (2009) shown for observed discharge during the failure of Page l 10

Teton Dam [Adapted from Xu and Zhang (2009)].

Figure 3 shows an example of the outflow, hydrograph during the piping failure of Teton Dam in 1976. The time of 10:30 a.m. is a critical point that separates the breach initiation phase (ending at point A)from the breach development phase (from point Ato point D). After 10:30 a.m. (point A)the rates of discharge and erosion of embankment materials from the pipe increased more rapidly.' After the collapse of the dam crest at about 11:55 a.m. (point B), the breach developed rapidly due to overtopping of the collapsed dam crest and soon reached a peak discharge at about 12:15 a.m. (point C). The failure time associated with the breach development process, Tf, was approximately 4 hours4.62963e-5 days <br />0.00111 hours <br />6.613757e-6 weeks <br />1.522e-6 months <br />.

Fell et al (2003), point out that it has not been possible to identify the time of initiation of internal erosion associated with piping, and so it has not been possible to estimate breach initiation phase times for historical dam failures. However, as indicated in Figure 3, it is~the breach development time, Tf, between points A and Dthat is the predicted "failure time" in the Xu and Zhang (2009) method. However, the Xu and Zhang (2009) definition of failure time differs to that used in some other failure-time prediction equations, such as Froehlich (1995), in which itris defined as the period of higher outflow between points B and E or about 1.25 hours2.893519e-4 days <br />0.00694 hours <br />4.133598e-5 weeks <br />9.5125e-6 months <br />' as indicated in Figure 3. The importance of this for our review is not that there are differences between the way that failure time is defihied in different breach parameter prediction methods, but that there should be a consistency between the way that failure time is defined in the method that is used to estimate it and the way that it is applied in a breach model, which for Jocassee is the HEC-RAS model. This consistency is discussed in Section 6.4 as it applies to the Jocassee Dam.

Duke Energy and its consultant HDR Engineering have selected the dam breach methodology as proposed by V. Xu and 1. M. Zhang in their technical paper entitled "Breaching Parameters for Earth and Rockfill Dams" as published in the Journal of Geotechnical and Geoenvironmental Engineering, December 2009. This is a "state of knowledge" paper, especially for consideration of a piping breach in a zoned dam. The main objective of the paper is to develop robust empirical formulas with physical meaning for predicting dam breaching parameters.

6.0 Xu and Zhang (2009) Regression Model 6.1 Control Variables The Xu and Zhang regression equations are based on an analysis that'includes more recent failures than are included in earlier relationships, such as Froehlich (1995), and also include data from China that have not been previously available. Data from a total of 75 earth and Page I 11

vvijIIii Gii ~I~iOJv*jV~ V**llI iiS u 1 Jq IiV ZCFJ" .Ci rockfill dam failure cases were used to develop multiple regression equations to predict the following five breach parameters (dependent variables), which are divided into two groups, breach geometry/and hydrograph:

  • ' Breach Geometry o Breach depth (Hb,)

o Breach top width (Bt) o Average breach width (Bave)

  • Hydrograph
  • o Peak outflow rate (C*)

o Breach development time or failure time (Tf)

The breach side slope, z,* can be calculated from the breach depth (H,,), breach top width (Bt) and average breach width (Bare).

Unlike previous relationships, Xu and Zhang included erodibility as a control (independent) variable and they found it to be the single most important of all the control variables that they considered. The complete list of five control variables that they used to estimate breach parameters is as follows:

  • Dam height (X1 = H4/Hr, dam height Hd and a reference height Hr, where Hr = 15 in),
  • Reservoir shape coefficient (X2 = Vw,1"3/l-w,, volume of water above breach invert Vw and depth of water above the breach invert at the time offailure, Hw.),
  • Dam type (with corewalls, concrete faced and homogeneous/zoned-fill),
  • Failure mode (overtopping and seepage erosion/piping),
  • Dam erodibility (high, medium and low).

Xu and Zhang (2009) included rockfili dams in the homogeneous/zoned-fill dam type. Dam type, failure mode and dam erodibility are included in the regression analysis as virtual discrete variables that represent either the presence or absence of an attribute.

As mentioned above, Xu and Zhang (2.009) found dam erodibility to be the most important control variable for predicting all five breach parameters. Dam erodibility is described as a relative measure of erodibilitybased on the information on materialcompositions and compaction conditions, dam cross-sectionalgeometry, construction time, andother relevant pieces of construction information'.T The three erodibility classes (low, medium or high) used in the Xu and Zhang equations refer to the technical lecture paper by Briaud (2008), whereby soils Page I 12

  • .Al ~luauO=U.,ZIIy *UlovI@IVU I I LM UIAUI and rocks are classified into various erosion resistance categories based on erosion velocity or shear stress, as shown in Figures 4a and b, respectively.

As summarized in the background discussion in Section 3.0,. the Jocassee Dam is a modern wt H H7*F designed and constructed dam wi I Icore and filters.

1000003 RMl 100 10 1

0.1 0.1 1.0 10.0 100.0 Vofy(mis)

Figure 4a. Briaud (2008) erosion categories for soils and rocks based on velocity.

1000 Rm 100 (mmnlhr 10 1

0.1 0 1 10 100 1000 10000 100000 Shwr Stms (Pa)

Figure 4b. Brlaud (2008) erosion categories for soils and rocks based on shear stress.

Page 1 13

LiuF1,dgIIm Q +,.u,;E.y... l,

v. '.J;r:.n:tion.._

zone. These considerations would conservatively place the Jocassee Dam embankment in the low erodibility category (IV)and likely in the very low erodibility category (V).

6.2 Prediction Equations and Confidence Intervals Xu and Zhang (2009) developed two types of multiple regression equations for estimating mean values of the five breach parameters:

  • Best Exact Prediction - based only on failure cases where all five control Variables were available [see Table 4 in Xu and Zhang (2009) for numbers of failure cases for each breach parameter].
  • Best Simplified Prediction - inc~ludes additional failure cases where not all five control variables were available [see TableS5 in Xu and Zhang (2009) for numbers of failure cases for each breach parameter].

Xu and Zhang (2009) present their final best exact and best simplified, equations for all five breach parameters in Tables 4and 5 of their paper, respectively. These tables also include the standard error of the regression, which can b~e used to calculate confidence intervals for breach parameter estimates in addition to mean predictionslthat are obtained directly from the regression equations. Xu and Zhang (2009) conducted a comparison with Other breach prediction methods and demonstrated that their method provides a lower bias and standard error on predictions than .other method's. They ,admit that since this comparison used data on which their model is based it may have had an advantage over.other models included in the comparison, but they nevertheless conclude that the comparison is valid.

Xu and Zhang (2009) included two applications of their equations to actual dam failures for Banqiao and Teton dams. Their mean predictions are compared with the observed values of the breach parameters for both the best exact. and the best simplified models in,Tables 7 and 18 of their paper, respectively. In addition to the mean estimates, they include lower and upper bound estimates based on a 95% confidence interval. The meaning of such a' confidence interval is that there is a 95% chance that the true values of the breach parameters are contained in the range between the lower and upper bound values. The loWer and upper bound values for"an additive regression model are equally spaced on either side of the mean estimate and this can be seen, within the limits of round off in~the estimates, for the estimates of the breach depths given in Tables 7 and 8 of the paper. However, the spacing between the mean estimates and the lower and upper bounds for the remaining four breach parameters is very asymmetric. :Specifically there are approximately two to three and a half fold differences

'between the mean and lower bound estimates and between the upper; bound and mean estimates for all breach parameters except height of breach. Clearly the widths'of the 95%

Page I14

WAitfhl~lrl 7rmm- nllnllr! KJ(hl~.I*:(]~JJ.. L.l.* II ~ rn~ l~

  • l IMVl I VVl confidence intervals are large for all breach parameters and this is further discussed in the following paragraph. We return to this topic of the confidenceintervals on the Xu and Zhang (2009) breach parameter estimates in Section 6.3 where we discuss how itapplies specifically to the Jocassee breach parameter estimates that are the focus of this review.

The reasOn for the asymmetric confidence intervals relative to the mean estimates for all breach parameter predictions, other than breach depth, is that the nonlinear or multiplicative form of the regression equations that Xu and Zhang (2009) found best fit the historical breach data. To develop the regression modeis these multiplicative relationships were converted to an additive form, following the usual practice in regression analysis (Haan 1977), by applying a logarithmic transformation. To obtain confidence intervals, an assumption is made that the variability in the breach parameters that is not accounted for or explained by the variation in the values of the control variables is distributed according to a normal or Gaussian (.bell curve) probability distribution. This unexplained variability is associated with a~llthe breach parameter values in ther data set of historical dam failure cases that were use~d to develop each regression equation [see Tables 4 and 5 in Xu and Zhang (2009)]. When the muitiplicative form of regression equation is Used, the assumption that the unexplained variability in the values of the historical breach: parameters is normally distributed applies in the transformed or log-space.

Thus, when the confidence intervals are transformed to their natural space using an *inverse logarithmic transformation, they are significantly asymmetrical with the range between the mean and the upper bound typically much greater than the range between the mean and the lower bound.

6.3 Implementation of Xu and Zhang (2,009) Method We applied the Xu and Zhang (2009) regression equations to Jocassee Dam to obtain the mean estimates of the breach parameters and to comparethem with the HDR estimates. We also estimated the confidence intervals on the :estimated breach parameters using .equations for the confidence intervals on a multiple regression that can be found in many textbooks (e.g. Haan 1977). To verify our spreadsheet for applying the Xu and Zhang regression equations we first reproduced, within a small round-off error, the mnean and confidence interval estimates that are presented in the Xu and Zhang (2009) paper for Teton and Banquito dams. we then unsuccessfully attemptedto reproduce the HDR mean estimates but after some additional checking the HDR estimates were revised. These final HDR estimates now closely match our estimates as is shown later in this section.

As discussed earlier, the Xu and Zhang equations incorporated the various erosion resistance categories (low, medium or high) based on the technical paper by Briaud (2008). Our interpretation, based on the rockfihl materials, compaction and density,, places the rockfill at Jocassee Dam between the very low and low erodibility categories (see Figures 4a and b).

Page .] 15

.';u LII f.~,... ~L1:~ ~ ThCFfl ~

Therefore, we recommend that the most appropriate and conservative breach parameters for Jocassee Dam should be based on using the low erodibility values.

Tables 1 and 2 show the input values and the breach parameter estimates from our application of Xu and Zhang (2009) to Jocassee Dam. Separate breach parameter estimates are included for the Best Exact and Best Simplified Prediction regression equations. Table 2 also includes a comparison with the final HDR mean estimates (in blue font) for low erodibility. A more detailed version of Table 2, which includes the values calculated for all regression parameters and references the regression equation numbers for the equations that we used from the Xu and Zhang (2009) paper, is contained in Appendix B.

Table 1. Input values used for Xu and Zhang (2009) application to Jocassee Dam.

Elevation Hw Reservoir Volume Iptft msl ft acre-feet Crest Elevation 1125 Reservoir Elev 1110 ______

Breach bottom elevation Low erodibility 870 240 1,091,716 Dam Height -Hd = 385 ft Hr = 15 rn Dam Type Homogeneous/zoned-fill Failure Mode Seepage erosion/Piping Table 2. Breach parameters estimates from Xu and Zhang (2009) application to Jocassee Dam with comparison to HDR mean estimates.

rodbiltyPramter Breah Man estExac PrdicionBest Simplfied Prediction Mea Mean 95% Confidence Interval Mean Mean 95% Confidence lnterval Category HDR* Lower IUpper HDR Lower Upper Height of breach, Nb ft. Low 255 253 168 337 255 255 176 334 Failure time, Tf hrs. Low J(b)(7)(F)

Breach top width, Btft. Low I 701 701 I 306 1,606 I 665 666 I 299 1,485 Average breach width, Save ft. Low I 566 566 I 246 1,3061 1S* 515 I 223 1,193 P~ealkoutfltow, Qpft3/sec., Low (b7)F

  • Note that HDR used the Best Simplified Prediction for Height of Breach instead of the Best Exact Prediction One reason for the small differences between the HDR estimates and our estimates shown in Table 2 is that HDR used the Best Simplified Prediction equation for height of the breach, Hb, in both the Best Exact and Best Simplified Predictions for the other breach parameters. We used Page I 16

IAJtlL.. Id1tri puli tli coorr nb 1*F 1 the separate Best Exact and Best Simplified Predictions of Hb for the corresponding Best Exact and Best Simplified Predictions, respectively, for the other breach parameters. HDR's approach was based on the higher R2 value obtained for the Best Simplified Prediction equation for Hb, wher~eas our approach followed the examples for Banqiao and Teton dams in the Xu and Zhang (2009) paper.

From Table 2 it can: be seen that using loweoibility in the Best Exact Prediction equations, the mean failure time is estimated to be about :the mean breach top width about 700 feet, the mean aVerage breach width about 570 feet, the mean height of breach about 250 feet, and the mean peak discharge undelJ IFcfs.

The confidence interval estimates for each breach parameter, are shown in Table 2 as lower and upper bound estimates that define the width of the confidence interval both below and above the mean estimat~es. Similar to the examples for Banqiao and Teton dlams, which we discuss in Section 6.2, the asymmetry in the confidence intervals can be seen for all breach parameters excePt height of the breach, which is symmetrical because of the additive form of the regression equations for height of the breach as explained in section 6.2. The symmetry in breach parameter estimates for height of breach and the asymmetry in estimates for failure time, breach top width, and average breach width can be seen in Figures 5a and b. In these figures the confidence intervals for breach parameter estimates for Jocassee Dam are plotted as a ratio to the mean estimate for the Xu and Zhang (2009) Best Exact and Best Simplified Prediction equations, respectively. The asymmetry in the confidence intervals for failure time, breach top width, and average breach width can be seen by the longer lines above the mean estimate.(plotted at a ratio =1.0 shown by the blue dashed line) than below the mean estimate.

In Table 2 we have placed boxes around the values of the breach parameters that we recommend as being most applicable to Jocassee Dam. These are mean estimates based on low erodibility. The basis for using low erodibility is explained earlier in this section and is basedon discussions in Sections 3.0 and 6.1. The basis for using mean estimates is discussed here.

In Section 6.2, we described Xu and Zhang (2009) mean and confidence interval breach parameter estimates for each breach parameter as follows:

  • Mean estimate: Based on applying a regr:ession equation to represent or "explain" the fraction R2 of the variability in the observed breach parameter values in the data set of historical dam failures in terms of the variation in the Values of the observed values control variables that were used to derive the regression equation.

Page 17

. .IU rI n* JIS- IJin ., U-S.

.,-; ).J t,.iir us s r, F us..i~,s ExactiPre :1 Best iCt IOflS 4.0 w 3.5 Cu 3.0 -I-Cu 2.5 E

w 2.0 Cu 0

I.

0

'a-.

1.5 1.0 0.5

_ Mean Estimates -1 Cu Height of breach Failure time Breach top width Average breach width Breach Parameter a) Best exact predictions Best Simplified Predictions 4.0 3.5 Cu

'I 0 3.0 w

4-.

Cu 2.5 w 2.0 Cu 1.5 0

4-.

1.0 w~I Mean Estimates 0

4-. 0.5 Cu Height of breach Failure time Breach top width Average breach width Breach Parameter b) Best simplified predictions Figure 5. Relative width of confidence intervals for Xu and Zhang (2009) breach parameter estimates for Jocassee Dam based on low erodibility expressed as a ratio to the mean estimate (ratio =1.0).

Page I 18

  • ju~t*l=lb u. ILy Q=I.IIU lIvl=a l",lul.Lv,
  • Lower and upper bound estimates (Confidence interval): Based on the variability between observed breach parameter values in the data set of historical dam failures that is not represented or "unexplained" by the regression equation for the mean value.

This unexplained variability is the fraction (1 - R2) of the .variability in the observed breach parameter values -in the .data set of historical dam failures.

Graphically one can picture the unexplained variability in breach parameter estimates as being a scatter of points about the regression line representing the actual .breach parameter Values.

A key question is, "Where would one expect Jocassee Dam to fit in the range of the' scatter or unexplained variation of breach parameter values for the data set of historical dam~failures used by Xu and'Zhang (2009):?" Based on the fact that Jocassee Dam is a well designed and constructed rockfill dam that has incorporated modern designi criteria and defensive design features (see Section 3.0) the breach geometry parameter estimates are expected to be in the range below the mean but above the lower bound confidence .interval estimates. Additional factors that support; this range of geometric, breach parameter estimates include the following;

  • Erodibility: Based on the discussion in Section 6.1, Jocassee Dam would be expected to be in the lower part of the range of low erodibility as defined in the Xu and Zhang (2009) implementation of the Briaud (2008) erodibility classification system.
  • . uni-directional breach formation: A breach from thevyer unlikely piping failure modes of piping through the foundation in't heb>;(F would star()7*

h a7TF am and can only progress of the dam and Ib7) piz!.E)" in contrast to developing in two directions for most historical breaches.

This would be expected to reduce the width of the breach because of the more erosion resistant and stablI~b(*F) Ion one side of the breach, in addition to slowing the breach development, with the result that the peak breach flow rate would be reduced.

  • Deposition of eroded rockfill material and development of tailwater: The rockfill material moved by the breaching process would simply ravel downstream by the flow through the breach, and much of this material would be deposited a short distance downstream of the dam. This would cause a significant tailwater to develop that Would reduce flow velocities through the breach and inhibit both downward and lateral development of the breach with the result that a narrowerbreach would be formed, taking a-longer time to form, and resulting in a lOwer peak breach flow rate.

The combination of all .these considerations provides strong evidence' that the use of mean values of breach geometry parameter estimates for Jocassee Dam Would be a conservative choice. In reality we would expect that the breach geometry, parameter estimates for Jocassee Page I 19

  • =.,o, * * * -
  • ntoinc uu.[,=,.uu ........

' ilS-i

  • ,.. m m.

. ..m .*

  • . I"l I'* *t'tt't
u. ,u*l .......
  • U IWVB 0 VVI Dam are in the range between the mean and lower bound confidence interval estimates obtained from the Xu and Zhang (2009) regression equations.

Similar arguments made for breach geometry parameter estimates for Jocassee Dam being in the range between the mean and lower bound confidence interval estimates can be made for failure time, except that they would support a failure time estimate between the mean and the J

upper bound confidence interval estimate. Therefore, the use of the mean estimate for failure time is also considered to provide a conservative estimate of the failure time as defined by Xu and Zhang (2009) for the reasons stated above.

6.4 Use of Failure Time Estimate in HEC-RAS Model for Jocassee Dam The importance of consistency between the definition of the Xu and Zhang (2009) failure time when using failure time estimates in the HEC-RAS breach model is pointed out in Section 5.0.

Figure 6 contains breach hydrographs for headwater (blue line related to left scale

  • 1,000),

tailwater (brown line related the left scale

  • 1,000) and breach discharge (green line related to the right scale) obtained by HDR for a piping failure of Jocassee Pam at a location immediately downstream of the internal boundary in HEC-RAS model that represents the darn. The rate of breach progression that is defined as a HEC-RAS input is shown by the black line (related to the left scale). Points A, B and D are equivalent to points that are defined in Figure 3 for the Teton Dam failure in Section 5.0.

To achieve a compatible implementation of the Xu and Zhang breach parameter estimates in HEC-RAS the Xu and Zhang mean breach failure time (between points A and D) and mean breach geometry estimates were input to the HEC-RAS model. The Xu and Zhang mean peak breach flow rate estimate was then closely matched by adjusting the piping coefficient to a value of 0.1, the breach weir coefficient to a value of 2.0, and the sinusoidal rate of breach progression relationship was. adjusted between points B and D as shown in Figure 6.

The adjusted values of these coefficients appear to be reasonable in terms of representing flow through the rockfill material and flow through the breach following collapse of the dam crest of the rockfill dam, respectively. In addition the form of the resulting breach hydrograph also appears to be reasonable for a piping failure mode and closely matches the Xu and Zhang mean peak breach flow rate estimate. We consider this to be a realisticbut conservative breach hydrograph that has good defendablity based on the validityi of the Xu and Zhang (2009) method, the conservative nature of the mean breach parameter estimates, a piping failure mode initiating in the abutment, the deposition* of rockfill immediately below the dam, the low erodibility of the rockfill material, and various characteristics of a modern dam thatwere include in the design and construction oQfJocassee Dam.

Page 120

.... ........*.. .... . .. ..... .orn" ooo*,

Jocassee Dam Breach Progression and Hydrographs SEP LIE 300,C)o000 I 2.500,000

  • '2.000,000 I

II 1040 a4 1,000,000 JO2 0 ,  : 500,000

.... 00 00 11/1/2006 12:0 11/1/2006160 11/2/20060o0

- t4.awater - TadwaterBeahPoru. - Breach Ocarg

- - - Breach tnatm.. -- -- P~p Cohap.. - - - Breach fo nr~t~ao. Compl~et Figure 6. HDR's HEC-RAS Jocassee Dam breach hydrographs 7.0 Review of Keowee Breach Parameters 7.1 Overview Section 7.2 provides a summary of some key features of Keowee Dam that affect its response to an upstream failure of Jocassee Dam. Section 7.3 is our review of the breach parameters proposed for Keowee Damn.

7.2 Keowee Dam The Keowee Dam is an embankment dam consisting Olb*F, F*7)F1 The embankment is approximately 3,300 feet in length and is confined between the r*T* la~nd the natural high ground forming ther'*i*' The crest is at EL 815 or 15 feet above normal Keowee Lake level of EL 800. The soil materials contained in heda aI~with regard to Briaud (2008) erodibility resistance categories used by Xu and Zhang (2009) as described in Section 6.1.

Given thei*'*n Iature of the Keowee Dam, overtopping if 'o resultin a dam breach regardless of the rate of rise of the headwaters. Given the fact that a Jocassee Dam breach would cause a relatively rapid rise in headwaters at Keowee, it is anticipated that Page I 21

the flood waters woul4b()*

I(L)(7)(F) If the embankment.

7.3 Breach Parameters for Cascade Failure of Keowee Dam The breach parameters for Keowee Dam should correspond to the breach process that would be expeCted to result at this dam for the breach flood wave from the postulated piping failure of Jocassee Dam. For overtopping dam failures, the empirical breach parameter methods, such as Xu and Zhang (2009), are based on case histories of overtopping dam failures resulting from natural inflow floods. These natural floods would be expected to have a slower rising limb than the flood wave generated by the failure of a major dam, such as Jocassee Dam. Typically a natural overtopping flood first results in overtopping of a low spot of the dam (accounting for wind and wave effects), or at a higher rate of overflow overtopping can occur at more than one low spot in the dam crest with lesser overflow overextensive portions of the crest. The rate of rise of the overtopping hydrograph for natUral floods is likely to provide opportunity for a breach to develop at one of these low spots, or as a result of vulnerable conditions on the downstream face of the embankment dam. As the breach development progresses more rapidly it typically draws down the headwater level to below the dam crest level and thus focuses all the available erosive energy on developing a single breach rather than developing multiple breaches along the dam crest. The interactions between potential breaches initiating at multiple locations along an embankment dam are not considered in breach algorithms such as that in HEC-RAS. They are considered in the physically-based models developed by Wang and Bowles (2006a-d, 2007).

'Incontrast to the typical overtopping breach process associated with a natural flood that is summarized in the previous paragraph. a rapidly rising hvdroeraoh resulting from the Upstream failure of Jocassee Dam wouldl (b)(7)(F) JKeowee Dam. This would be expected to not only, init~iate breaching at multiple locations alone the_ Lam crest. bu (b)(7)(F)

I(°'c'cF' Isince the initiation of breaches would likely not reduce the headwater quickly enough to focus flow into only a single breach. Thus, it is expected that following the upstream failure of Jocassee Dam, there would be-.a o)()F)f the Keowee Dam.

The approach implemented by HDR for an overtopping failure of the Keowee Dam .resulting from the postulated upstream piping failure of Jocassee Dam is as follows:

1. a trapezoidal breach of the main high section of Keowee Dam represented using the HEC-RAS breach algorithm with an average breach width of almost 900 feet, a failure time oj~)F J and a Sinusoidal breach progression relationship; and Page I 22
2. an almost 1,900 feet wide rectangular "gate"* in the west saddle dam that opens in 30 mains. to simulate the breach developing over essentially the entire remaining length of Keowee Dam.

This dimensionand failure time used to represent the breach of the highly erodible Keowee Dam appears to be reasonable for the rapidly rising overtopping flood wave resulting from the upstream failure of Jocassee Dam based on the considerations discussed above. The Dam Overtop TriggerElevation of 817 feet msi corresponds to two feet of overtopping of Keowee Dam, which is likely much more overtopping than this highly erodible dam would withstand for this cascade failure mode. However, this trigger elevation can be viewed as a conservative assumption in the sense that the higher headwater and greater volume stored behind Keowee Dam for this trigger elevation would result in a higher peak breach flow rate downstream.

The HEC-RAS breach hydrograph provided by HDR for the cascade failure of Keowee Dam shows a very rapidly rising limb consistent with the failure times selected and the assumed breach dimensions that represent removal of most of the main embankment dam at Keowee..

In conclusion, the proposed _breach parameters for Keowee Dam appear to be reasonable given the cascade failure mode and non-applicability of the empirical breach parameter estimation methods to this type of failure. Physically-based breach models '(Morris et al 2012) may provide some useful insights into the rate and extent of development of the Keowee breach in the longer term.

8.0 Conclusions

.For Jocassee Dam:

  • Given the design, construction and excellent performance of the Jocassee Dam it is concluded that a piping failure of the Jocassee Dam is extremely unlikely to occur.
  • Even in the extremely unlikely event that a piping failure mode initiates at Jocassee Dam, the potential for uncontrolled release of the Jocassee Reservoir through failure of the main section of Jocassee dam is even more remote. This is because the potential internal erosion and piping would progress very slowly, due to the protective filtering systems and/or the resistance of the rockfill to movement and collapse. The present monitoring and observation procedures and systems would indicate movement of materials and would give cause and time for intervention. This intervention could be

[b)(7)(F)I Page 123

fnecessary, it could also be accomplished through acDT'FI I°lx

[jthat would result in a flow rate that could be managed at Keowee Dam without threat to the Oconee N.S.

  • The Xu and Zhang (2009) method that has been applied for Duke by HDR to estimate breach parameters for Jocassee Dam has been demonstrated to provide the best predictions of breach parameters amongst similar regression methods. it is, therefore, considered to be a "state-of-the-practice" published regression method for estimating piping dam breach parameters. Unlike most other methods, it includes erodibility as a control variable. This variable was found to be the most important variable in the regression Xu and Zhang (2009) method. The capability to consider erodibil ity is particularly important given that the dense rockfill in Jocassee Dam would be conservatively classified as low erodibility. See Figures 4a and b.
  • A review of the analysis performed by HDR indicated that calculations using the breach parameters with consideration of "low erodibility" for the rockfill Jocassee dam reduces the mean estimates of the breach size and peak discharge and increases the failure time considerably compared with previous estimates based on other methodS. These low erodibility mean estimates of the breach parameters are associated with the low erodibility of a rockfill dam, and they are considered reasonable and even conservative for Jocassee Dam. They are conservative because of the low to very low erodibility properties of Jocassee Dam such that it would be expected to be a more resistant dam to the breach process than Other low erodibility dams for which failure data were used by Xu and Zhang (2009). In addition, the uni-directional breach formation, deposition barrier of moved rockfill material and development of tailwater during breach formation would lead to conservative estimates of breach parameters using the Xu and Zhang (2009) mean estimates.

For Keowee Dam:

  • The proposed breach parameters for Keowee Dam appear to be reasonable given the cascade failure mode and non-applicability of the empirical breach parameter estimation methods to this type of failure.

Page 1 24

.'~Wtzii from putlic d I r 1:r iocrn 2.300.

9.0 Recommendations The following recommendations are made based on our review:

1. We recommend that the Xu and Zhang (2009) breach parameter estimates for a piping failure of Jocassee Dam should be based on low erodibility mean estimates (see values in boxes in Table 2) as realistic but conservative values.
2. We recommend that the breach parameters proposed by HDR for Keowee Dam should be used as realisticbut conservative values for a cascade failure of that dam as the result of the failure of iocassee Darn.
3. While the Xu and Zhang (2009) regression equation approach presented herein is presently the "state-of-the-practice" and provides for the appropriate range of breach parameters to represent a piping failure at Jocassee Dam; in the longer term, we recommend that future consideration be given to a physically-based model. When available, this type of model may provide additional insights to better define the conservative nature of the present evaluation by considering the material properties, site geometry, reservoir capacity-stage relationship, the Uni-directional breach development starting at a relatively high elevation in-l TF 'and other factors such as the effect of the tailwater development due to deposition of rock downstream of the breach. It is recommended that the application of this type of model should be considered using bounding values of model inputs to better understand and appreciate the beneficial nature of the physical features on limiting breach development for the Jocassee Dam.
4. For Keowee Dam, in the longer term, we also recommend that future consideration be given to a physically-based model. This type of model may provide additional insights considering the characteristics of a Jocassee breach flood wave arriving at Keowee. It is recommended that the application of this type of model should also be considered using bounding values of model inputs to better understand the physical limitations on breach development for the Keowee Dam as a validation of the estimates reviewed in this report..

We note that at present the HR-BREACH physically-based breach model, which could be applied in the future in response to Recommendations 3 and 4, is undergoing further development and testing for a piping failure condition for a zoned rockfihl dam, such as Jocassee; however, in the future such research and verification may be available.

Page I 25

~Ait~d rm bi 1rlovr * 'n I*doII lCFlP*' 2 10 10.0 References Briaud, J. L. 2008. Case Histories in Soil and Rock Erosion: Woodrow Wilson Bridge, Brazos River Meander, Normandy Cliffs, and New Orleans Levees. Journal of Geotechnical and Geoenvi ron mental Engineering, 134(10): 1425-1447.

Fell, R., Wan, C. F., Cyganiewicz, J. and Foster, M. _2003. Time for Development of Internal Erosion and Piping in Embankment Darns. Journal of Geotechnical and Geoenvironmental Engineering, 129(4):307-314.

Findlay Engineering. 2004. Potential Failure Modes Analysis (PFMA) for Jocassee Dam.

Conducted for Duke Hydro for submission to the FERC.

Foster, M.A. and Fell, R. 1999. A Framework for Estimating the Probability of Failure of Embankment Dams by Piping Using Event Tree Methods. UNICIV Report No. R-377.

School of Civil and Environmental Engineering, The University of New South Wales.

ISBN: 85841 343 4.

Froehlich, D. C. 1995. Embankment Dam Breach Parameters Revisited. Proceedings, Water Resources Engineering, 1995 ASCE Conference on Water Resources Engineering, ASCE, New York. pp. 887-891.

Haan, C.T. 1977. Statistical Methods in Hydrology. Iowa State University Press.

Leps, T.M. 1973. Flow Through Rockfill. In Embankment Dam Engineering - Casagrande Volume, John Wiley & Sons, New York, by R. C. Hirschfeld and S. J. Poulos. pp.87-107.

Morris, M.W., H-assan, M.A.AM., Wahl, T.L., Tejral, R.D., Hanson, G.J. and Temple, D.M. 2012.

Evaluation and Development of Physically-Based Embankment Breach Models.

Proceedings from the FLOODrisk 2012 Conference.

Reclamation-USACE-URS-UNSW. 2008. Piping and Seepage Toolbox.

Sowers, G.F. 1987. Jocassee Main Dam Design, Construction and Performance. Report to Design Engineering Department, Duke Power Company, Charlotte, North Carolina. April.

Wahl, T. 1. 1998. Prediction of Embankment Dam Breach Parameters--A Literature Review and Needs Assessment. Dam Safety Report No. DSO-98-004, U.S. Department of the Interior, Bureau of Reclamation, Denver, Colorado.

Page I 26

Contains becunry oensiuv{ I!ItUII.=lullI Wahl, T. L. 2012. Several verbal discussions with J. 1. Ehasz regarding the use of the Xu and Zhang technical paper as well as Verbal discussions of erodibility factors as related to rockfill dams.

Wang, Z. and Bowles, D.S. 2006a. Overtopping Breaches for a Long Dam' Estimated Using a Three-Dimensional Model. Proceedings of the 2006 USSD Annual Lecture, San Antonio, Texas. June.

Wang, Z. and Bowles, D.S. 2006b. Dam Breach Simulations with Multiple Breach Locations Under Wind and Wave Actions. Advances in Water Resources, 29(8):1222-1237.

Wang, Z. and Bowles, D.S. :2006c. Three-Dimensional Non-Cohesive Earthern Dam Breach Model. Part 1. Theory and Methodology. Advances in Water Resources, 29(10):1528-1545.

Wang, Z. and Bowles, D.S. 2006d. Three-Dimensional Non-Cohesive Earthern Dam Breach Model. Part 2. Validation and Applications. Advances in Water Resources, 29(10):1490-1503.

Wang, Z. and Bowles, D.S. 2007. A Numerical Method for Simulating One-Dimensional HeadCut Migration and Overtopping Breaching in Cohesive and Zoned Embankments. Water Resources Research, 43(5):W05411.

Xu, Y. and Zhang, L;M. 2009. Breaching Parameters for Earth and Rockfiil Dams. Journal of Geotechnical and Geoenviron mental Engineering, 135(12): 1957-1970.

Xu, Y. 2010. Analysis of Dam Failures and Diagnosis of Distresses for Dam Rehabilitation. Ph.D.

Thesis. The Hong Kong University of Science and Technology. January.

Page 1*27

Appendix A Descriptions of Potential Piping Failure Modes for Jocassee Damn The potential piping failure modes identified for Jocassee Damn during the RAC PFMA are summarized below followed by a comment on breach by sloughing and unraveling.

JPFM 5a1: Piping Tholhthe Foundation (Natural Dam) in thl*('F The location of JPFM 5a1 iS in thei lFrea 'where there is no rockfill dam and a "Natural Dam" overlying the bedrock foundation retains the reservoir. Figures A.1 and A.2 show sections through theiL>71(F> If the main Jocassee Dam. The section forms a "Natural Dam" in the locations where the ground surface of the section is above the dam crest elevation. The location of this "Natural Dam" section is shown on Figure A.3 and labeled as "JPFM 5a1". The failure mode is summarized in the following two paragraphs.

The reservoir rises to a critical level at which time a seepage path develops through fracturesin the weathered rock. The seepage passes into the residual soil which forms the downstream slope of the natural dam. The seepage initiates movement of the residual soil as well as infilled soil in the joints and fractures of the weathered bedrock.

The eroding material moves toward an unprotected exit near the toe of the natural dam and beyond the core/cutoff trench of the rockfill dam; the unprotected exit allows the movement of material to continue. As the infilled joint material continues to erode the seepage velocities and the flow rate increase. The fractures remain open and the internal erosion process progresses. The process may or may not be detected but successful intervention does not take place. The internal erosion process eventually begins to increase uplift, pressures under the downstream slope of the natural dam causing sloughing or slope instability to occur.

JPFM 5a2: Piping Through the Foundation Near tht('('F' Failure mode JPFM 5a2 is in theli'7 F rea but is located Where there is aS(*F;1(

section of the rockfill dam overlying the bedrock foundation. If the same mechanism described above for failure mode JPFM 5a1 occurs at a location Where the Main Dam is underlain by the natural dam then the seepage may exit into the Rockfill shell of the main dam and cause failure of the dam by unraveling. At this location the main dam is abou4D)°F) IThe location Of Page 128

Figure A.11()7F lsection (from page 1 of 3 of the HDIF(b)7)* IGeological Study).

Figure A..Sketch of piping through rock foundation in th*(j()(F) j failure mode JPFM Sa-1.

Page 129

m i ii i

  • il J* *,Ji *t7 Figure A.3. Google view showin te lo~cations of failure modes JPFM Sal, 5a2 and 3 in th***

thi'bTF 'is shown on Figure A.3 and is labeled as "JPFM 5a2." The process of piping through the foundation for JPFM Sal and 5a2 is essentially the same. For both cases the flow is through joints and fractures in the bedrock, eroding infilled material, and does not emerge from the bedrock fractures until well downstream beyond the location of the cuof tenh ndcore projected into th{°z -"The j primary difference between JPFM Sal and 5a2 is that for JPFM 5a2 the seepage exits from the foundation into the downstream rock shell of the dam causing unraveling 1 of the shell, and for JPFM Sal the seepage exits from the foundation into the downstream natural slope causing sloughing and slope instability.

'Comment on breach by sloughing and unraveling "Forbreach to occur by unraveling or sloughing of the downstream face of the embankment, the increased seepage due to internal erosion and piping in the foundation would hove had to dischargeinto the downstream zone as shown in the figure below.

For sloughing to occur, the downstreamface would hove to be relatively steep, and the shoulder material a cohesionless soil, probably sandy grovel, or gravely sand, possibly with some silty fines. The process would have to be allowed to continue until it gradually eroded away the crest and allowed the reservoirto overtop.

Unraveling usually relates to the progressive removal of individualrocks by fairly large seepage flows flowing through the downstream rockfill. Fosterand Fell (1999) indicate that in the database they assembled, there was only one case of piping failure in an embankment with breach by unraveling (After Reclamation-USACE-URS-UNSW 2008).

Page I 30

JPFM 5b: Piping Through the Foundation (Natural Dam) at the Inrte.rf=e..Be*÷ween the Weathered Rock in th e 1 land the Core Material The failure mode in the Piping and Seepage toolbox that fits this failure mechanism the best seems to be piping through the embankment Initiating Mechanism IM15. The following sequence of events describes this failure mode:

1. Occurrence of a threshold pool level which creates a gradient greater than the crtia

[*),)raien o creor foundation material that exists at the interface between th*(~()

foundation material.

2. A seepage path exists along the interface with the select core material.
3. Movement of the select core material initiates.
4. The select core material moves into an exit point beyond the flared filter material and into the rockfill shell or the downstream face of th ej~j)()F /
5. A pipe (crack) develops in the select core material or the residual foundation soil material and progresses upstream to the upstream shell.
6. The core material is capable of supporting a roof and does not collapse into the pipe (crack).
7. Core or foundation material continues to move through the pipe (crack) in the select core material.
  • "
  • SEEPAGE INTO
  • ~SEEPAGE FROW

- E

\..PIPE, OR ZONE J_

OF SUFFUSION Breach by unraveling or sloughing of the downstream slope (ReclamatIon-USACE-URS-UNSW 2008).

Page 1 31

vwiu ;V*IU 1'u- vu ,* ,*..=, * ...............

8. The upstream filter material fails to fill the pipe (crack) and to plug the exit into the downstream shell.
9. The seepage may or may not be detected but intervention is not successful.
10. A breach develops by sloughing and unraveling or by sinkhole development.

JPFM A. ptnibzaTrnah Rock Foundation inth hjJ*F, The description of the piping mechanism for piping through the rock foundation in thJ'*'"J I of the dam in the locatio hwniFiuel A.4 is essentially the same as for the piping failure mode JPFM 5a2 in th* of the dam. Figures A.1 and A.2 for the JPFM 3: Piping Through Embankment For this failure mode the initiation of the flaw occurs by "Cross Valley Differential Settlement" as described by the initiating mechanism IMi in the Piping and Seepage Toolbox. The schematic drawings of the failure mechanism in the toolbox are shown below as Figures A.5 and A.6.

Figure A.4. Location of foundation oioinf failure mode JPFM 4 in th Page 1 32

Figure A.5. Location of the transverse crack in the upper third of the dam section.

LMI - Cro-s "*'alUe Differntia Settlement Figure A.6. Cross Valley Differential Settlement causes transverse cracking in the upper third of the embankment.

The reservoir rises to a critical level to initiate seepage through a crack in the core caused by Cross Valley Settlement (Initiating Mechanism IMi). There is sufficient velocity flowing through the crack that core material along the sides of the crack begins to move toward the downstream side of the core. There is a flaw in the filter that aligns with the crack so that the material is not stopped at the filter. Erosion continues to occur and material from the upstream filter does not fill the crack. The internal erosion is not detected and continues to develop. As the material erodes, a void develops in the core material. The void eventually collapses and a sink hole develops at the crest of the dam or upstream of the crest. The process may or may not be detected but successful intervention does not take place. Breach of the damn occurs by sloughing or unraveling or by sinkhole development.

The location of a breach for an embankment piping failure mode would occur near th*<j*T)J i twere there is a break in grade in the foundation profile as schematically shown- inI Figure A.6. The same discussion as given in the footnote on breach by sloughing and unraveling for failure mode JPFM 5a2 applies to this embankment piping failure mode.

Page I 33

Appendix B Breach Parameters Estimates from Xu and Zhang (2009) Application to Jocassee Dam with Comparison to HDR Mean Estimates Best Exact Prediction Best Simplified Prediction Zone-filled Dams b3 0.132 Piping h4 0,236 Height of breach, Hb ft. !Eqn. 9 Low b5 0.031 IiI2i5 253J 168 337 Low C1 0.858L 255, 255 176 334

(.b)(7)(F)

Falilure time, Tif hrs.

Zone-filled Dams b3 -0.089

'Piping b4 -0.239 Piping b4 "-0.262 Breachbtop width, Btft. Eqn. 14 tow b5 -O.289 970 701 306 1,606 Low b5 -0.2 2 8 8j6 J 299 1,485

'" Zone;filied Dams b3 -0.226 Piping b4 -0.339 Piping .b4 -1.747 Average breech width, Dave ft. Eqn. 15 low b5 -0.39 1[ZZr* lZ s] 246 1,306 Low bS -L26L 515 515 223 1,33

(*b)(7)(F)*

Peak outflow, Qp ft3/sec.

Note that HDR used the Best Simplified Prediction for Height of Breach instead of the Best Exact Prediction Page 1 34

  • ,,,,,-'-;,,p Sr.u.*uIy S',.,mIuv uu *ormduon.

WltrnnOlia from pUDIIC alSCIOsure unaer lU,** £;.*w.

ENCLOSURE 2-Board of ConsultantslFERC EFM Review Meeting report

WItflnROI from pUDIIG aiSClosure unouri Iu*.,rz L:.3u.

J. Michael Duncan, Pht. D., P.E. James F. Ruff, Pht. D., P.E.

Civil Engineer Civil Engineer 1600 Carlson Drive 1015 W. Mountain Avenue Blacksburg, VA 24060 :_otClis.C 0sr jmd@vt.edu b)6/

Gabriel Fernandez, Ph.D., Gonza/o Castro, Ph.D., P.E.

Geotechnical Consultant Geotechnical Consultant 207 Sherwin Circle 1Muster Court Urbana, IL 61801 Linton* MA 02420 gfernand@illinois.edu b)6 April 4, 2013 Duke Energy Oconee Nuclear Station Attn: Mr. Curtis Arnold Mailcode: ON02TH 7800 Rochester Highway Seneca, SC 29672

Subject:

Oconee Nuclear Station Board of Consultants/FERC EFM Review Meeting March 12-14, 2013

Dear Mr.Arnold:

INTRODUCTION The subject of the Board meeting consisted of the potential effects of a "sunny day" failure of Jocassee Dam on the Oconee Nuclear Station (ONS) and the protection measures being designed to protect the Station. The prote~res that were discussed are based on certain breach parameters that resulted in a failure time o 4lI

.... refer to herein as "current" breach parameters. The Board response to Question 1 deals v~w~ suay of alternative breach parame~rkon~nducted by Duke Energy and its consultants that leads to substantially longer failure time o01..... Ireferred to herein as "new" breach parameters  !

The Board responses to Questions 2 through 6 address the investigations and analyses required for the necessary modifications to protect the Oconee Nuclear Station against flooding caused by a falr j~gee Dam, assuming the current breach parameters of the dam consistent with a failure time o*¶~

Li)Duke Energy refers to the use of the current parameters as path]1.

BOARD QUESTION 1: Are breach parameters reasonable?

Mr. Culrtis Ar'nold 1111UUIl, vvI[FlflUI*IOIU , UIbUlUbUlt* UllU~1 I u*.ri* S.V..

April 4, 2013 Page 2 The Board of Consultants has been asked to comment on the new breach parameters for Jocassee Dam based upon information provided by Duke Energy and CB&l.

Field trips were taken to the dam sites. Presentations were given of the computer simulations of potential failure of Jocassee Dam and the routing of the flood through Lake Keowee and Little River. Runs were made using I-D and 2-D HEC-RAS routing along with several scenarios of the breach parameters. The breach parameters considered were those of Froehlich (1995) and Xu and Zhang (2009). The Board considered the Xu and Zhang parameters to be "state of the art" based on their more extensive data of dam failures and breach development. Xu and Zhang found dam erodability to be the most important control variable for predicting their breach parameters, which had not been considered in the current breach parameters that led to th (b)(7)(F) [failure time. Noting that Jocassee Dama has been monitored since 1972 when it was constructed, thiere is no indication of excessive seepage that would indicate potential piping or movement of any soil or internal erosion. . Ehasz and Bowles (2013) evaluated the Xui and Zhang breach parameter~s with respect to Jocassee and Keowee dams. They reported the breach parameter of low erodability as estimates for Jocassee Dam would provide a conservative estimate of the failure time as defined by Xu an Zhang. The Board agrees with the low erodability assessment for Jocassee Dam.

As noted by Ehasz and Bowles, the failure times for the current and new parameters are not defined in the sammnnr.The failure time o (b)(7)(F) Ifor the current parameters is defined in accordance with Froehlich and corresponds to the period of time during which the great majority of the outflow takes place. The failure time o or th nwbech parameters follows the Xu and Zhang definition that includes the total time for the breach development phase. The new parameters would have a failure time of aboufbl7TF? [using the Froehlich definition.

  • The Board is not aware of any piping failures in properly constructed central core-rockfill dams that have been in operation successfully for extended periods of time, i.e. 40 years with a relatively constant net head. Furthermore, the breach parameters evaluated by Xu and Zhang as well as those determined by Froehlich are related to the "development phase of the breach", which takes place once the piping process has advanced sufficiently to trigger sliding, sloughing of the shells'and breaching of the core. However, in our case it might be pertinent to review the history of the Jocassee dam performance to comment on the "warning phase" during which the piping process is .initiated and developed. The Jocassee dam reservoir was filled in 1972 and most seepage detected corresponded to abutment springs in the upper 100 ft below reservoir level. Leakage in th has remained astdyflow of about 2.0 to 30 gpm. On the px~xF) leakage is higher. 700 to 800 gpm, and increased only during two episodes in 1977 and 1978, when seeping water with concurrent development of subsidence features were detected on the right abutment downstream of the dam axis. In both cases it was determined that seepage took place through soil-filled joints in partially weathered rock. Additional grouting with sodium silicate was carried out in the affected areas, seepage was substantially reduced and has remained constant to date. Also, filtered wells were installed in the subsidence areas. It is pertinent to note that during the 1978 subsidence event the reservoir level was lowered 15 ft below nornial pool level as a precaution. The volume of water released corresponded to a significant portion of the total reservoir volume.

In the board's view, the dama performance to date indicates that:

'..,.'I I.~II IO O.I:,l ILy 01: IbILiVq= II ilJi II IdLIUU[l.

M .Curtis Arnold .......... T ... ..... ........ ~~ ,,,r,.C 1 ,,

April 4, 2013 Page 3 a) Unusual seepage events were promptly detected and timely and successful intervention was implemented. The springs appeared in the right abutment rock, about 300 ft downstream of the crest of the dam.

b) The "preferential seepage paths" susceptible to piping developed mostly along in-situ, weathered, materials, outside the footprint of the dam; and took place over an extended period of time that allowed for a lowering of 15 ft of the reservoir level.

c) The preferential paths have been grouted & plugged successfully since no seepage increase has been reported after 1978.

d) The areas of concern are heavily instrumented, i.e. piezometers and weir instruments Based on these considerations, it is plausible to argue that installation of automatic data loggers in the existing instruments, combined with frequent inspections would allow for a timely detection of signs of distress. An action plan can be implemented to initiate spillway discharge to reduce the reservoir volume prior to an eventual "dam breach" which wvill significantly ameliorate the impact on Keowee Darn and the Oconee Nuclear Station. The potential for reducing the reservoir level is not considered in the breach parameters estimates and thus it further supports the fact that the new "breach parameters" are conservative.

Breach Development phase- A revised 'breach failure time ofIZ~has been proposed for Jocassee Dam. A relevant precedent to support this assessment can be the failure of Hell Hole Dam in California in 1964. The dam was designed as inclined- core rockfill dam. In December 1964, the last lift of dumped rockfill, 220 ft high (crest elevation 4470 ft), had been placed when an intense storm deposited 18 in. of rain at the dam site. The core, at a lower elevation than the crest was overtopped at 1:30 pm on December 21 and flow commenced through the rockfiii; water emerged from the downstream toe at 3:00 pm on December 22, and a maximum water level was reached at 8:20 am on December 23. By 3:30 pm on December 23, most of the water impounded behind the rockfill had flowed through the washout removing about 700,000 cu yd of rock downstream. A conservative assumption for the breach initiation when the flow emerged at the downstream toe would result in a 24 hour2.777778e-4 days <br />0.00667 hours <br />3.968254e-5 weeks <br />9.132e-6 months <br /> long breach time for the 220 ft high dumped. rockfill at Hell Hole Dam. Jocassee Dam has a higher height of breach, 255 ft, but the rockfill was compacted i]b()F'which makes it more resistant to erosion, although the Hell Hole rockfill size was larger. More significantly however, Jocassee Dam volume is 11,000,000 cu yd, which is an order of magnitude lagrthan the Hell Hole Dam removed volume. This comparison is quaitaivebut indicates that th* I(F~

breach time proposed for Jocassee Dam is conservative.

Since Jocassee Dam has been operating and has been monitored since 1972 and will continue to be monitored and inspected, the Board considers the Xu and Zhang breach parameters that result in the longer breach hydrograph period are conservative for routing the flood downstream through Keowee Dam.

BOARD QUESTION 2: Please comment on the proposed subsurface investigations. What modifications do you suggest for the proposed investigations?

The proposed field and laboratory geotechnical investigation programs for the ONS and for Keowee Dam

Mr.,Curtis Arnold ~ f..~I~£~ .~ or April 4, 2013 Page 4 are reasonable and should provide the parameters needed for the design of the Fukushima External Flood Mitigation Project (EFM), path I. Like any geotechnical investigation one should adjust the program as information is developed. Given the time required to perform additional subsurface investigations because of site clearance needs, in the Board's opinion the scope of the initial program is appropriately more extensive than would likely be eventually needed. We suggest replacement of some of the borings with CPT soundings. For example along the crest of the intake canal dike one could add CPTs next to two of the proposed borings for the purpose of calibrating the soil classification inferred from the CPTs. Then the rest of the borings could be replaced with CPTs assuming that the two pairs of Borings/CPTs indicate soils which lend themselves to CPT soundings.

It might also be useful to review existing records of embankment materials testing during construction, i.e. grain size distributions, compaction tests, in-situ permeability tests and other field observations. Also the specification requirements for placement of embankment materials should be reviewed. Also, it would be useful to have for Keowee Dam a description of current embankment conditions, including pertinent cross-sections with seepage line elevations. During the site visit it was noticed that the seepage line intersected the downstream slope above the toe, eseilyin an area near the wvest corner.

sepae asalso observed in the rock cut at the[(bj 7)(j-Sigifcan "This information may be helpful in selecting critical areas for additional exploration.!

Also, it would be beneficial to have:

a) The estimates of the current factor of safety of the embankment slopes.

b) The range of actual fluctuations of reservoir pool elevation since operations started.

c) Estimated peak ground accelerations during the 1979 earthquake.

d) History of concrete spillway discharge to help assessing the potential for erosion downstream.

BOARD QUESTION 3: Please provide your input for our in-process documents on safe drilling procedures near dams and contingencies for appearance of internal erosion and excessive borehole sloughing.

The proposed in-process procedures address cases in which boreholes encounter artesian conditions or loss of drilling fluid and the responses to these conditions while drilling and while grouting. The proposed actions are reasonable. It should be made clear that the documents address the responses of the field engineer/geologist and not of the driller, and that the action of "calling Engineer" refers to the Engineer in overall charge of the geotechnical work for the project. The field engineer/geologist should have the primary responsibility to monitor that proper drilling procedures are followed and to detect any unusual events, and should be familiar with the main objectives of the investigations, drilling procedures in general and the specific requirements for drilling in embankment dams.

While the responses to artesian conditions are well planned, it is important to anticipate and plan for their possible occurrence. Artesian conditions are not likely to be found when drilling from the crest of the embankment but can be found when drilling at the downstream toe. Such a condition can be anticipated if there is "knowledgeof piezometric levels at the location of the proposed borings. If there are existing piezometers their readings should be reviewed. If there are no piezometers in the general area, we suggest

I~l nU "l n I "l" iEV i" i i-Mr. Curtis Arnold VVL,,,,I,,U £,I,, *,........ ... l.. .Zl... .

April 4, 2013 Page 5 that a CPT sounding with pore pressure measurements capabilities (piezocone) be pushed stopping at various depths until the pore pressure reading stabilizes. In this manner one would get a clear picture of the piezometric conditions and whether there is a vertical gradient, and specifically whether artesian conditions exist at any depth, and if so how high above the ground surface would the water level in the borehole rise. Then drilling can be made with the appropriate length of casing above the ground surface to prevent flow from the ground into the borehole. The CPT equipment should have the capability of grouting as the CPT is withdrawn.

Loss of drilling fluid can occur when either the boring encounters very pervious materials or the pressure in the drilling fluid become high enough to cause cracks to develop in the ground. Losing drilling fluid into very pervious materials can be stopped by driving casing below the bottom of such materials before recharging the borehole with drilling fluid. There are no significant consequences to such loss of fluid if it is detected quickly and prompt action is taken. On the other hand loss of fluid due to cracking of the ground should be avoided, particularly within the body of an embankment dam or in its foundation. If safe drilling procedures are followed, cracking of the ground is highly unlikely. General recommendations for drilling in embankments are presented in Thle Corps of Engineers publication ER-I1110-1807 "'Engineering Designa Procedures for Drilling in earth Embankments". It is recommended to use casing and to keep the casing no more than 5 ft above the bottom of the borehole to minimize the area of the embankment soil on which the drilling fluid pressures are applied. It is important to keep the drilling pressures at the bottom of the borehole at a minimum. One of the causes of excessive drilling fluid pressures at the bottom of the borehole is blockage to the flow of the return of drilling fluid, thus return should not occur along the outside of the casing since this annular space can be easily blocked.

Return should be between the drilling rods and the casing. Advancing the borehole too fast in clayey soils can result in clay chunks in the return fluid that can block the annular space between the drilling rods and the casing and lead to high drilling pressures. The COQE publication recommends that the borehole be advanced no faster than 1 ft/min. It is important to monitor closely tihe pressure at which the drilling fluid is being pumped into the drilling rods, any sudden increase in pressure may be an indication of blockage and thus the advance of the borehole should be stopped until the pressure returns to normal levels.

Rapidly raising and lowering the drilling rods should be avoided because it causes a pumping action with increases in drilling fluid pressure at the bottom of the borehole.

Cracking is more likely when drilling through the emba"nkment in areas where the horizontal normal stresses on upstream-downstream vertical planes can be expected to be lower than for at- rest conditions, and thus it is prudent to avoid drilling at such locations. Such locations can be identified by examining a longitudinal profile along the crest of the darn and the change in the height of the dam and in the depth of compressible soils beneath the dam, if any. For this purpose an example of soils to be considered compressible would be clays that are normally consolidated or become normally consolidated under the weight of the dam. At locations where the height of the dam or the depth of compressible soils changes abruptly there would have been significant differential settlements along the dam during construction which would have reduced horizontal stresses and thus drilling should be avoided anywhere close to such locations. It is not possible to develop rules that would quantify what an abrupt change is since it would depend on how compressible the embankment material and foundations soils are and the length over which the abrupt change occurs. For the general conditions where borings are planned for the EFM project a depth change with a slope of more than about 2H: 1V may be considered abrupt. The Board

Mr Crts rnld vvl.u~ hfi ui.u,*uuIu*7;.;.

-u-*

Apr.Ctis A4odV 2013i~ll~UIIL I UU~UIL~ I~r Page 6 examined the longitudinal profile for the West Saddle Dam and Keowee Dam and in our opinion no such locations are present. The Board recommends that the longitudinal profile along the Intake Canal Dike be examined for potential conditions unfavorable for drilling.

BOARD QUESTION 4: Given flooding defined in the SER, is RCC overtopping protection feasi ble and can it be implemented safely on an embankment retaining a normal pool with a functioning powerhouse? Should tihe design team consider other overtopping protection methodologies?

The Board believes that R.CC slope protection can be constructed on the downstream slope and the crest of Keowee Dam without damaging the embankment, provided that the wvork is done with appropriate care. The RCC armoring layer should be constructed on a permeable bedding layer to prevent uplift pressures beneath it. The upstream edge of the RCC armoring layer on the crest of the embankment can be protected against uplift due to water pressures beneath it by tying it into a row of driven sheet piles along the upstream edge. Using sheet piles for this purpose rather than a concrete wall will avoid having to excavate into the top of the dam. At the lower edge of the armoring layer on the downstream slope, the RCC can be extended horizontally beyond the toe of the embankm~ent to form a stilling basin of appropriate length. The downstream end of this stilling basin can be protected against back-cutting erosion by a row of driven sheet piles. This row of sheet piles should have "windows" formed by omitting every third or fourth pile, or by using shorter piles at the same intervals to avoid blocking flow within layered soils beneath the slab. Drain holes through the stilling basin, angling upward in the downstream direction, will prevent buildup of uplift pressures beneath the RCC slab.

For the design of the RCC overtopping structure it is important to avoid that the overtopping protection spillway begins operation before the original capacity of the service spillwvay is achieved. In the Board's view, we should try to maintain the current crest of the embankment constant to maximize the hydraulic capacity of the existing spillway before operation of the RCC overtopping structure is triggered. The installation of the overtopping structure can lead to introducing a new potential mode of failure, embankment erosion, for a more frequent event than the maximum capacity of the existing service spillway. In this regard, the RCC design should also consider the operation of the RCC overtopping protection structure for floods with return periods shorter than those anticipated with the Jocassee dam failure.

While other overtopping protection technologies such as riprap could also provide resistance against erosion, the Board believes that armoring the embankment with RCC will afford robust erosion protection, and is a more appropriate choice considering the high flow velocities associated with the postulated overtopping event.

BOARD QUESTION 5: What analyses are critical to the design of these modifications? What analysis methods and design standards does the Board recommend?

Safe design of the proposed modifications will require several types of geotechnical analyses, including those listed below. The Board recommends the following analysis methods, and the use of design standards in accordance with the practices and policies of the U. S; Army Corps of Engineers:

Mr. Curtis Arnold -;L......... ...... i; .....

i~ .. ..... io...

April 4, 2013 Page 7

  • Evaluation of precedent. Key parameters for the proposed overtopping structure, including the maximum unit discharge, cfs/ft, maximum overflow height, and Maximum height of dam. These need to be compared with performance of observed precedent in other RCC overtopping structures.
  • Slope stability. Limit equilibrium analyses using two computer programs, such as Slope/W and SLIDE are suitable for slope stability analyses. Using two programs is recommended as the most effective and efficient method of checking results. The Keowee reservoir loading surcharge triggered by failure of the Jocassee dam is " "pressures within the embankment. Given the existing high seepage line an (b)(7)(F) it would be pertinent to make sensitivity analysis to assess the factor of safety of the downstream slope. If the RCC is included in the stability analysis it should be assumed that the RCC is cracked and its strength is only the frictional resistance..
  • epg. Finite element seepage analysis programs such as Seep/W and Slide are appropriate for seepage analyses. Although some zones within the cross sections analyzed may be partially saturated, the Board recommends using conventional seepage analysis procedures, where the quantity of seepage and the pore pressures above the phreatic surface are assumed to be zero. The quantity of seepage above the phreatic surface is very small, and it is conservative to neglect the soil suction within this zone. In addition, analyzing only saturated flow avoids the complication involved in estimating initial suction conditions, soil-moisture characteristic curves, and the relationship between soil suction and hydraulic conductivity for partially saturated soils. Depending on the duration of the surcharge, the quality of the RCC upstream cut-off barrier might need to be upgraded to minimize additional embankment seepage which can develop further pore pressures in the downstream slope.

A thorough evaluation of the potential for this increase and the impact on the stability of the embankment is required at this stage.

  • Sliding. The Board agrees that limit equilibrium spreadsheet calculations will be appropriate for analysis of safety against sliding.
  • Toe erosion. The Board agrees that the potential for erosion caused by flow parallel to slopes can be approached using river erosion technology, and the methods for evaluating scour that have been developed recently by Briaud, 2008.
  • Side Slope Erosion. Permissible water velocities for flow to avoid erosion of soils of various grain size are available in the report of the ASCE Special Committee on Irrigation Research (1926), and in hydraulic engineering textbooks.
  • Protection Liftoff. Negative pressures from the overflowing water can be minimized by care during construction of the RCC to insure that the profile is smooth at joints between sections. Where the RCC overlay is stepped, the flow will be tumbling, with no significant negative pressures. Because the protection will experience only one flow episode, cavitation is unlikely to be a problem.
  • Excavation Dewatering. The Board agrees that well flow formulas will be appropriate for analysis of flows and pressures due to dewatering, and suggests that a dewatering contractor be engaged if significant dewateri ng is required.
  • Pressures on Buried Structures. For rigid buried structures such as reinforced concrete box culverts and vaults, the Board recommends the use of earth pressure distributions like those developed by the U. S. Army Corps of Engineers. For flexible buried conduits, the Board recommends the use of charts and formulas developed for design of flexible metal culvert structures (Duncan and Drawsky, 1983).

BOARD QUESTION 6: Proposed erosion control measures at the embankment toe of Keo wee Dam and along plant slopes exposed to flowing water.

Even though the RCC will reduce the velocity of the overtopping flow and dissipate some of the energy,

Mr. Curtis Arnold LIlll u; April 4, 2013 Page 8 the toe of the slope of Keowee Darn should be protected from erosion. Several options are available, such as a riprap blanket, continuing the RCC, or constructing a concrete plunge pool or stilling basin that would extend along the entire length of the embankment toe. The RCC stilling basin alternative was discussed in the Board's answer to Question 4. The riprap protection alternative should also be considered. Quarry or natural rock material for riprap appears to be readily available. Because of the height of the overtopping water and the height of the Keowee embankment, the velocities will be high and riprap rock size will be large. Depending on the overtopping discharge aii~d the thickness of the riprap, flow conditions will be interstitial and overflowing the riprap blanket. Neglecting friction, velocities at the toe of the dam would be approximately 75 ft/s. Actual velocities would be lower based upon estimated friction factor for the riprap. Design of the scour protection would be based on extrapolation of data from riprap tests conducted by the U. S. Anny Corps of Engineers (Maynord. 1988) in channels and included in the Corps _Engineering Manual No. !1110-2-1601(1994) and tests for the Bureau of Reclamation at Colorado State University (Mishra, 1998) for riprap on steeply sloping channels.

Riprap armoring would be placed along the toe immediately downstream of the piling cutoff wall. To be conservative, the riprap should be designed for the estimated velocity at the toe of the embankment and extend 300 to 400 feet downstream. The riprap should be placed to a minimu~m depth of 2 to 2.5 times D5 0 of the riprap for about 100 feet from the toe. The rock should be of relatively well graded sizes and the voids filled with a smaller dumped rock while the layers are placed. The riprap layer beyond 100 feet should have a minimum depth of 1.5 to 2.0 D5 0. The river channel downstream from Keowee Dam will scour during the overtopping event. The riprap layer at the toe of the dam is placed to stop and/or reduce the erosion at the toe and into the embankment. Riprap can also be placed at locations where embankment slopes intersect and where flowv might be parallel to the embankmaent slope.

J.M. Duncan Gonzalo Castro Gabriel FernandezJaeF.R James F. Ruff f

Mr. Curtis Arnold yjijk 1. 1 JLi; I u uu;I 2..

April 4, 2013 Page 9 REFERENCES Briaud, J.L. 2008. "Case Histories in Soil and Rock Erosion: Woodrow Wilson Bridge, Brazos River Meander, Normandy Cliffs, and Newv Orleans Levees", Journal of Geotechnical and Geoenvironmental Engineering, ASCE 134 (10): 1425-1447 Duncan J.M. and Drawsky R.H. 1983 "Design Procedures for Flexible Metal Culvert Structures",

Geotechnical Engineering Report No. UCB/GT/83-02, Univ. of California, Berkeley, CA, 50 pages, February 1983, Second Edition, May 1983)

Ehasz, J. L. and Bowles, D.S., 2013. Jocassee and Keowee Dams Breach Parameter Review, an independent review prepared for Duke Energy, February, 34 pp.

Froehlich, D. C., 1995. "Embankment damn breach parameters revisited". Water Resources Engineering, Proceedings of the 1995 ASCE Conference on Water Resources Engineering, San Antonio, Texas, August 14-18, 1995, p. 887-891.

Lagasse, P. F., Clopper, P. E., Zevenbergen, L. W., Ruff, J. F. , "Riprap Design Criteria, Recommended Specifications, and Quality Control," National Cooperative Highway Research Program Report 568, Transportation Research Board, Washington, D.C., (2006)

Maynord, S. T., Stable Riprap Size for Open Channel Flows," U.S. Army Corps of Engineers, Waterways Experiment Station, Hydraulics Laboratory, Technical Report HL-88-4, Vicksbury, MS (1988).

Mishra, S. K., "Riprap Design for Overtopped Embankments," Ph.D. Dissertation, Department of Civil Engineering, Colorado State University, 139 p. (1998).

U.S. Army CorPs pf Engineers, "Hydraulic Design of Flood Control Channels," Engineering Manual No. 1110-2-1601, U.S. Army Corps of Engineers, Waterways Experiment Station, Vicksbury, MS (1994).

Xu, Y.and Zhang, L. M, 2009. Breaching parameters for earth and rockfill dams, Journal of Geotechnical and Geoenvironmental Engineering, vol. 135, no. 12, p. 1957-1970.

(lL l3 I tO/* IL *Wrilunl Ii WI1 UIIUIU*UI* IU IVIl- I,131 Or.. IV, WII*II Ib

  • ublicly available).

JU IIWW W.........

,+am:+,+..t,,,.*i*

........... ___..* ......... ,*,..,= n* *,..,.,,++.

  • ENCLOSURE 1 Jocassee and Keowee Dams, Breach Parameter Review

'll'u,.,I.,lu lllul ......iJ*i*. ,;;*-,..; .............. 1.., I*F'iP'.Fi_ _"l*'Gl"l JOCASSEE AND KEO WEE DAMS ,1 Breach Parameter Review February 2013 By S Joseph L. Ehasz, P.E.

/ . David S.Bowles,P.E.

......... t;St ,,t, Lo.O t.;i m.'.v.m...

. vm Jocassee Dam - Breach Parameter Independent Review Joseph L. Ehasz, P.E., URS Civil Construction & Mining Dr. David S. Bowles, P.E., RAC Engineers & Economists 1.0 Scope of the Independent Review The scope and deliverable for this review was stated as follows in an email, dated December 11, 2012, from Mr. Dean Hubbard, Duke Energy, to MVr. Joseph Ehasz, URS Civil Construction &

Mining.

Scope of.the independent review: Provide an independent review of the postulated breach parameterassumptionsfor the Jocassee dam, and the Keowee reservoirdams and dikes to be used as inputs for routing of flood waters with 1-EC-RAs and SRH-2D.

The independent review would determine if the breach parameters are realisticand appropriatelyconsider the dam/dike designs, construction, materialsand failure progressionfor the assumedfailure mode. The Jocassee assumedfailure mode is a piping failure and the Keowee reservoirdams and dikes assumedfailure mode is overtopping. The breach parametersalso need to be considered currentstate of knowledge and analyticalmethods (50.54Wf Letter requirement) and therefore defendable in an NRC review as being realisticbut conservative.

Deliverable: Independent initial review of the breach parameterassumptionsfor the Jocassee dam and Keowee dams and dikes with verbal report by conference call by 12/20/12. Independent review written summary with any recommendationsfor breach parameteradjustments to be submitted by January 15, 2013. The assessment should include a review of. the validity of.the model used (Xu Zhang 2009) and any other model that would provide more realisticbreach parameters.

Sections 2.0 - 6.0 focus on Jocassee Dam for an assumed piping failure mode and Section 7.0 contains a brief review of the failure of Keowee Dam asthe result of upstream failure of Jocassee Dam.

Regarding the requirement that the breach parameters are to be defendable in an NRC review as being realistic but conservative, we cannot predict the outcome of an NRC review but we have based our review on our engineering expertise and specific knowledge of Jocassee Dam.

Page I2

The following materials were provided by Duke Energy for this review:

1. FinalBreach Data Matrix Table - containing a comparison of a) the breach parameters and related attributes for the "100 Wilson Case 2" and b) a range of breach parameter estimates and related attributes based on the XU and Zhang (2009) regression method for Jocassee Dam.
2. Xu Zhang Breach Data - containing a range of breach parameter estimates and related attributes based on the Xu and Zhang (2009) regression method for Jocassee Dam.
3. Jocassee Main Dam Design, Construction and PerfOrmance, Report to Design Engineering Department, Duke Power Company, Charlotte, North Carolina, by George F.

Sowers, April 1987.

4. Xu, Y. and Zhang, L.M., 2009, Breaching Parameters for Earth and Rockfill Dams, Journal of Geotechnicaland GeoenvironmentalEngineering, 135(12): 1957-1970.
5. An Excel Workbook Jocassee BEP LE-ME Hydrographs Final containing HEC-RAS breach hydrographs for Jocassee Dam.
6. An Excel Workbook Final_BreachData_Matrix- 02082013 containing revised final breach parameter estimates based on the Xu and Zhang (2009) regression method and a summary of HEC-RAS inputs for Jocassee Dam.
7. Video clips from HEC-RAS for Jocassee Dam breach with low and medium erodibility.
8. An Excel Workbook Keowee Dam Breach Parameterscontaining KeoWee breach parameters.
9. An Excel Workbook Keowee Breach Hydrograph - HDR BEP LE containing HEC-RAS breach hydrographs for Keowee Dam.
10. Video clip from HEC-RAS for Keowee Dam breach.

In addition, we obtained a copy of the complete January 2010 Ph.D. Thesis, "Analysis of Dam Failures and Diagnosis of Distresses for Dam Rehabilitation", by Dr. Xu Yao from The Hong Kong University of Science and Technology.

Page I 3

2.0 introduction This independent review was performed on the Jocassee Dam postulated breach parameter estimates and underlying assumptions by Joseph L. Ehasz and Dr. David S. Bowles with assistance from Drs. Loren Anderson and Sanjay S. Chauhan. The review focused on the potential piping breach parameters for the Jocassee Dam based on the Xu and Zhang (2009) regression equations. The overtopping breach of Keowee Dam as the result of the failure of the upstream Jocassee Dam is discussed in Section 7.0.

Although review of potential dam breach parameters is the focus of this report, it is important to note that the physical features of the Jocassee Dam design and construction strongly influence the reality of any dam breach potential. Therefore, this review begins in Section 3.0 with a summary of some important physical features of the Jocassee Dam. We then evaluate if piping should initiate, would detection and successful intervention be likely to prevent a failure in Section 4.1, whatpiping failure modes might apply to Jocassee Dam in Section 4.2, and some general breach parameter considerations in Section 5.0. In Section 6.0 we evaluate, using the "state of knowledge," what are the appropriate breach parameters for Jocassee Dam? In Section 7.0 important features of Keowee Dam are summarized and the proposed breach parameters for Keowee Dam are reviewed. Conclusions are summarized in Section 8.0 and recommendations are listed in Section 9.0.

Appendix A contains descriptions of potential piping failure modes for Jocassee Dam. Appendix B contains breach parameters estimates from our application of the Xu and Zhang (2009) method to Jocassee Dam with a comparison to HDR mean estimates.

3.0 Background on Jocassee Dam Even before considering the potential Jocassee Dam breaching and establishing the appropriate breach parameters it is instructive to discuss the design and construction of the Jocassee Dam*

The following statements refer to the report entitled, "Jocassee Main Dam Design, Construction and Performance", by George F. Sowers, April 1987, and are significant to dam performance.

  • The dam was completed in 1967 and has been continuously monitored and has performed very well to the present. Even though the dam was designed and constructed in the mid-1g60's it has all the modern and defensive measures of the rockfill dams designed and constructed today. See Figures 1 and 2.
  • Beginning at the rock foundation level, th (b)(7)(F)

(b)(7 (F)

Page 14

lAr~.hk.d~4 ~ p~b'~t~ d:uilsurv ~J:. 1CQFfl Z.3~3 Figure 1. Google aerial view of Jocassee Dam.

I:))(7)(F)

Figure 2. Jocassee Dam cross section (Sowers 1987).

In addition, in order to decreas the hvdrauIi Rradientsao aI p*ile tecr zone wa*(°()F Page I 5

offset a reduction in horizontal stresses caused by deflection of the dam 1 1 1 I~b)(7(*) !This ensures that the the foundation contact. See Figure 2.

  • In order to protect the core materials from internal erosion and material mo~vement and potential piping of the core°x)F (b)(7)(F)

(b)(7)(F) See Figure 2.

  • In order to establish a dense rockfill (b)(7)(F)

I(b)(7)(F) ]This process produced a very strong and dense rockfill and a very stable rockfill embankment zone.

  • Quality Control: selection of materials and documentation was enforced by the Resident Engineering staff and maintained as an important function during the construction. As indicated above, the, selection and placement of the various zones were carefully done so as to maintain the compatibility of adjacent materials to eliminate migration of materials and maintain a stable embankment. Grain-size and density testing to verify materials and compaction were conducted at intervals to verify and maintain control of the placements. Field inspection was maintained during construction with Duke Engineering staff observing and interfacing to ensure the design intent was maintained during construction.

All of the above facts are important when considering the potential for internal erosion and piping at Jocassee Dam. The materials and features employed during design and construction, as described above, were all designed to minimize the possibility of piping and failure of the embankment. Thus, it is even difficult to envision the development of a piping condition at the Jocassee Dam, especially given the defensive design measures incorporated and with the past 45 years of excellent performance. However, a deterministic approach is being used to postulate a sunny day piping failure for Jocassee Dam. In Section 4.0, the potential for a piping failure of Jocassee Dam is discussed before discussing breach parameter considerations in Section 5.0 and reviewing the proposed breach parameter estimates using the Xu and Zhang (2009) method in Section 6.0.

Page 16

4.0 Dam Failure Considerations 4.1 Piping Failure Mechanism Given the description of Jocassee Dam design, construction and years of good performance in Section 3.0 it is very difficult to envision a "piping failure" through the main Jocassee Dam embankment. In addition, we are not aware that there has ever been a piping failure of a modern rockfill dam anywhere in the world.

For piping to occur, the following conditions must all exist:

1. there must be a source of water and a flow path,
2. there must be an unprotected exit for the eroded material,
3. there must be erodible material in the flow path, and
4. the material must support a roof for piping to enlarge and propagate.

The piping phenomenon within a dam must originate with internal erosion and material movement somewhere within the dam, perhaps at the foundation-core contact, and exit downstream and progress all along the foundation contact to daylight or to atmospheric conditions along the toe of the dam. The flow of water and materials must have an exit, to which it can carry materials and then progress Upstream along some erosion path and move materials from upstream; thus, the formation of the "piping phenomenon"'. With increasing movement of large amounts of water carrying materials, the flow would eventually form a path within the downstream rockfill portion of the dam. Ifthe process continues and the flows increase, it would eventually engage a larger and larger portion of the rockfill and eventually form a raveling condition within the rockfill large enough tormake the downstream shell of the dam unstable. If it becomes unstable enough to move rockfill downstream or to cause pockets through collapses, it could then expose the core, which is the water retaining structure of the dam for the upstream reservoir. If support is removed from the downstream side of the core, it would become unstable and partially collapse. The breach of the dam would progress as it overtops the core~and forms an overtopping breach and failure of the dam. This is considered the start of the "breach development phase" as discussed in Section 5.0.

The defensive measures within the Jocassee Dam are designed, constructed and incorporated erosion potential. To further defend against erosion and material movement, filters and a drain were specifically designed to eliminate material particle movement from one material in the embankment section through another and progressing downstream. Specifically, the filter Page I 7

gradation was designed to eliminate core material particles from moving through the filter and the gradation of the drain materials was designed to eliminate filter materials from movinR through the drain. In addition, the construction specifications were detailed such that'lb)(7)(F)I (b)(7)(F)

(b)(7* (F) All Of these measures essentially eliminate the potential for migration of materials and internal erosion of the dam materials; and hence, prevent a piping condition from forming.

Thus, an embankment piping failure of the Jocassee Dam is extremely unlikely, either deterministically or probabilistically.

However, if one hypothesizes that "piping develops along some hypothetical path," then one can ask, "What would be the conditions of a failure?" Given the above defensive measures, piping would be a very slow and detectable process; with very likely enough time fr intervention. In the event of piping initiation, emergency action could be taken by~T()'

(io)(7)(F)

(b)(7)(F) IThe condition would be observed and immediately considered unusual and serious enough to be studied, evaluated, and appropriate emergency action taken.

Given the fact that th (b)(7)(F) lespecially along the downstream portion, the stability of the downstream shell will be maintained even with considerable flow through the rockfill. Experience shows that rockfill can support considerable flows and still maintain stability. A study by Leps (1973), entitled "Flow Through Rockfill," has presented several cases of actual high flows through rockfills. At Hell Hole Dam in California over 20,000 cfs passed over and through a rockfill embankment dam without distress. ln addition to simply passing the flow, it is essentially impossible to form a "*pipe or tunnel" within the rockfill without seeing it, since the structure would collapse and block any formation of a "pipe". The flow may cause a raveling or movement and adjustment of the larger rock materials; however, it would not wash out the rockfill completely and expose the core very rapidly. Thus, it would be a long process and provide time to intervene by lowering the upstream water levels and reducing the reservoir storage. Once again, even in the hypothetical case of piping in a rockfill dam, there would very likely be time to intervene, significantly reduce the chance of dam failure, and reduce the outflow discharge and effects on the downstream flooding conditions.

4.2 Potential Piping Failure Modes for Jocassee Dam The information and discussion in Section 4.1 relates to a piping failure of the main or general sections of the Jocassee Dam embankment that would involve gross movements, and complete Page 18

  • -....... -^^.,rn ---on-i....o ,-nr~rml~imln failure of the dam. Earlier Potential Failure Modes Analyses (PFMAs) have investigated other sections of the dam and abutments for alternate potential piping conditions. In a PFMA, which was facilitated by RAC Engineers & Economists and included engineers from Duke Hydro and HDR, all 28 initiating mechanisms included in the Piping and Seepage Toolbox (Reclamation-USACE-URS-UNSW 2008) were considered for their applicability to Jocassee Dam. In addition, the PFMA reviewed potential failure modes identified and categorized in a PFMA conducted by Findlay Engineering (2004) for submission to the FERC, The following three piping failure modes were identified and categorized as being credible for the Jocassee main embankment dam in the RAC PFMA:
1. JPFM 5: Piping in thelbT)F
  • area at approximately Elevation 1020 ft.

msl!

a. JPFM Sal: Piping through the foundation (natural dam) in th*(x)F
b. JPFM 5a2: Pip~ing through the foundation near)(F th (b)(7)(F)III
c. JPFM Sb: Piping through the foundation (Natural Dam) at the interface between the weathered rock in the abutment~and the Core material.
2. JPFM 4: Piping through the rock foundation in the[ I cr I
3. JPFM 3: Piping through embankment.

Each of these failure modes is described in the Appendix A.

The most likely ("least unlikely") dam piping failure mode in thai*)F lis piping .

truhthej*7*F) I(JPFM 5ai).I"(7cF) I piping through th*[bl( fjF j of the main dam (JPFM 4) is a much more unlikely piping failure mode and main* dam embankment piping is extremely unlikely for the reasons described in the Sections 3.0 and 4.1 of this report.

The normal maximum operating level for the Jocassee Reservoir is Elevation 1,110 ft. msl. The reservoir operating rule is designed ,to keep the reservoir at or below this level for all but relatively rare floods. Historically the reservoir has never exceeded Elevation 1,110 ft. msl, although the annual peak reservoir level has been within a foot of that elevation in many years during its 45-year life. It is estimated that for the Jocassee reservoir pool tO exceed Elevation 1,110 ft. msl. would require a major flood of the order of the 1 in 200 AEP or rarer.

.Page 19

5.0 Breach Parameter Considerations When considering the piping failure of a dam it should be recognized that the seepage/erosion/piping process, which is the first phase (breach initiation) of the breach process (Wahi 1998), takes considerable time, as discussed in Section 4.1, especially if the embankment is well protected as described for Jocassee Dam in Section 3.0. However, the breach failure times that are the focus of this review are the second phase (breach development) or the time that the embankment would take to washout after the internal erosion process (piping) advances far enough to form a cavern within the downstream shell leading to a collapse of a portion of the downstream shell that exposes and results in a partial and progressive collapse of the core, exposing it to overtopping. The overtopping would then washout the embankment. Therefore, there would be expected to be considerable time available in the early phases of a piping process (phase one, or breach initiation) to intervene and take action, especially with the defensive measures that are designed into Jocassee Dam.

Figure 3 is adapted from the Xu and Zhang (2009) paper and illustrates the distinction between the two phases of the breaching process as defined by Xu and Zhang (2009): breach initiation and breach development. Outflow during the breach initiation phase is small, and in the case of a piping failure it is a flow through a developing pipe or seepage channel. In the breach development phase, the outflow and erosion develop more rapidly especially after initial collapse of the core.

80000

  • C A:, Outflow rapidly Increased

--- 6 0 0 0 0 - IasB: C: Dam Peak crest collapsed outflow ID: ,' Breach fully formed WBreach Initiation Breach Develo m etas u hs (Xu and Zhan ,eint"

- 20000-ABE O t 10 a~m. 11 12 13 p~m. 14 15 16 Time (hour)

Figure 3. Definition of breach initiation and breach development phases in Xu and Zhang (2009) shown for observed discharge during the failure of Page l 10

Teton Dam [Adapted from Xu and Zhang (2009)].

Figure 3 shows an example of the outflow, hydrograph during the piping failure of Teton Dam in 1976. The time of 10:30 a.m. is a critical point that separates the breach initiation phase (ending at point A)from the breach development phase (from point Ato point D). After 10:30 a.m. (point A)the rates of discharge and erosion of embankment materials from the pipe increased more rapidly.' After the collapse of the dam crest at about 11:55 a.m. (point B), the breach developed rapidly due to overtopping of the collapsed dam crest and soon reached a peak discharge at about 12:15 a.m. (point C). The failure time associated with the breach development process, Tf, was approximately 4 hours4.62963e-5 days <br />0.00111 hours <br />6.613757e-6 weeks <br />1.522e-6 months <br />.

Fell et al (2003), point out that it has not been possible to identify the time of initiation of internal erosion associated with piping, and so it has not been possible to estimate breach initiation phase times for historical dam failures. However, as indicated in Figure 3, it is~the breach development time, Tf, between points A and Dthat is the predicted "failure time" in the Xu and Zhang (2009) method. However, the Xu and Zhang (2009) definition of failure time differs to that used in some other failure-time prediction equations, such as Froehlich (1995), in which itris defined as the period of higher outflow between points B and E or about 1.25 hours2.893519e-4 days <br />0.00694 hours <br />4.133598e-5 weeks <br />9.5125e-6 months <br />' as indicated in Figure 3. The importance of this for our review is not that there are differences between the way that failure time is defihied in different breach parameter prediction methods, but that there should be a consistency between the way that failure time is defined in the method that is used to estimate it and the way that it is applied in a breach model, which for Jocassee is the HEC-RAS model. This consistency is discussed in Section 6.4 as it applies to the Jocassee Dam.

Duke Energy and its consultant HDR Engineering have selected the dam breach methodology as proposed by V. Xu and 1. M. Zhang in their technical paper entitled "Breaching Parameters for Earth and Rockfill Dams" as published in the Journal of Geotechnical and Geoenvironmental Engineering, December 2009. This is a "state of knowledge" paper, especially for consideration of a piping breach in a zoned dam. The main objective of the paper is to develop robust empirical formulas with physical meaning for predicting dam breaching parameters.

6.0 Xu and Zhang (2009) Regression Model 6.1 Control Variables The Xu and Zhang regression equations are based on an analysis that'includes more recent failures than are included in earlier relationships, such as Froehlich (1995), and also include data from China that have not been previously available. Data from a total of 75 earth and Page I 11

vvijIIii Gii ~I~iOJv*jV~ V**llI iiS u 1 Jq IiV ZCFJ" .Ci rockfill dam failure cases were used to develop multiple regression equations to predict the following five breach parameters (dependent variables), which are divided into two groups, breach geometry/and hydrograph:

  • ' Breach Geometry o Breach depth (Hb,)

o Breach top width (Bt) o Average breach width (Bave)

  • Hydrograph
  • o Peak outflow rate (C*)

o Breach development time or failure time (Tf)

The breach side slope, z,* can be calculated from the breach depth (H,,), breach top width (Bt) and average breach width (Bare).

Unlike previous relationships, Xu and Zhang included erodibility as a control (independent) variable and they found it to be the single most important of all the control variables that they considered. The complete list of five control variables that they used to estimate breach parameters is as follows:

  • Dam height (X1 = H4/Hr, dam height Hd and a reference height Hr, where Hr = 15 in),
  • Reservoir shape coefficient (X2 = Vw,1"3/l-w,, volume of water above breach invert Vw and depth of water above the breach invert at the time offailure, Hw.),
  • Dam type (with corewalls, concrete faced and homogeneous/zoned-fill),
  • Failure mode (overtopping and seepage erosion/piping),
  • Dam erodibility (high, medium and low).

Xu and Zhang (2009) included rockfili dams in the homogeneous/zoned-fill dam type. Dam type, failure mode and dam erodibility are included in the regression analysis as virtual discrete variables that represent either the presence or absence of an attribute.

As mentioned above, Xu and Zhang (2.009) found dam erodibility to be the most important control variable for predicting all five breach parameters. Dam erodibility is described as a relative measure of erodibilitybased on the information on materialcompositions and compaction conditions, dam cross-sectionalgeometry, construction time, andother relevant pieces of construction information'.T The three erodibility classes (low, medium or high) used in the Xu and Zhang equations refer to the technical lecture paper by Briaud (2008), whereby soils Page I 12

  • .Al ~luauO=U.,ZIIy *UlovI@IVU I I LM UIAUI and rocks are classified into various erosion resistance categories based on erosion velocity or shear stress, as shown in Figures 4a and b, respectively.

As summarized in the background discussion in Section 3.0,. the Jocassee Dam is a modern wt H H7*F designed and constructed dam wi I Icore and filters.

1000003 RMl 100 10 1

0.1 0.1 1.0 10.0 100.0 Vofy(mis)

Figure 4a. Briaud (2008) erosion categories for soils and rocks based on velocity.

1000 Rm 100 (mmnlhr 10 1

0.1 0 1 10 100 1000 10000 100000 Shwr Stms (Pa)

Figure 4b. Brlaud (2008) erosion categories for soils and rocks based on shear stress.

Page 1 13

LiuF1,dgIIm Q +,.u,;E.y... l,

v. '.J;r:.n:tion.._

zone. These considerations would conservatively place the Jocassee Dam embankment in the low erodibility category (IV)and likely in the very low erodibility category (V).

6.2 Prediction Equations and Confidence Intervals Xu and Zhang (2009) developed two types of multiple regression equations for estimating mean values of the five breach parameters:

  • Best Exact Prediction - based only on failure cases where all five control Variables were available [see Table 4 in Xu and Zhang (2009) for numbers of failure cases for each breach parameter].
  • Best Simplified Prediction - inc~ludes additional failure cases where not all five control variables were available [see TableS5 in Xu and Zhang (2009) for numbers of failure cases for each breach parameter].

Xu and Zhang (2009) present their final best exact and best simplified, equations for all five breach parameters in Tables 4and 5 of their paper, respectively. These tables also include the standard error of the regression, which can b~e used to calculate confidence intervals for breach parameter estimates in addition to mean predictionslthat are obtained directly from the regression equations. Xu and Zhang (2009) conducted a comparison with Other breach prediction methods and demonstrated that their method provides a lower bias and standard error on predictions than .other method's. They ,admit that since this comparison used data on which their model is based it may have had an advantage over.other models included in the comparison, but they nevertheless conclude that the comparison is valid.

Xu and Zhang (2009) included two applications of their equations to actual dam failures for Banqiao and Teton dams. Their mean predictions are compared with the observed values of the breach parameters for both the best exact. and the best simplified models in,Tables 7 and 18 of their paper, respectively. In addition to the mean estimates, they include lower and upper bound estimates based on a 95% confidence interval. The meaning of such a' confidence interval is that there is a 95% chance that the true values of the breach parameters are contained in the range between the lower and upper bound values. The loWer and upper bound values for"an additive regression model are equally spaced on either side of the mean estimate and this can be seen, within the limits of round off in~the estimates, for the estimates of the breach depths given in Tables 7 and 8 of the paper. However, the spacing between the mean estimates and the lower and upper bounds for the remaining four breach parameters is very asymmetric. :Specifically there are approximately two to three and a half fold differences

'between the mean and lower bound estimates and between the upper; bound and mean estimates for all breach parameters except height of breach. Clearly the widths'of the 95%

Page I14

WAitfhl~lrl 7rmm- nllnllr! KJ(hl~.I*:(]~JJ.. L.l.* II ~ rn~ l~

  • l IMVl I VVl confidence intervals are large for all breach parameters and this is further discussed in the following paragraph. We return to this topic of the confidenceintervals on the Xu and Zhang (2009) breach parameter estimates in Section 6.3 where we discuss how itapplies specifically to the Jocassee breach parameter estimates that are the focus of this review.

The reasOn for the asymmetric confidence intervals relative to the mean estimates for all breach parameter predictions, other than breach depth, is that the nonlinear or multiplicative form of the regression equations that Xu and Zhang (2009) found best fit the historical breach data. To develop the regression modeis these multiplicative relationships were converted to an additive form, following the usual practice in regression analysis (Haan 1977), by applying a logarithmic transformation. To obtain confidence intervals, an assumption is made that the variability in the breach parameters that is not accounted for or explained by the variation in the values of the control variables is distributed according to a normal or Gaussian (.bell curve) probability distribution. This unexplained variability is associated with a~llthe breach parameter values in ther data set of historical dam failure cases that were use~d to develop each regression equation [see Tables 4 and 5 in Xu and Zhang (2009)]. When the muitiplicative form of regression equation is Used, the assumption that the unexplained variability in the values of the historical breach: parameters is normally distributed applies in the transformed or log-space.

Thus, when the confidence intervals are transformed to their natural space using an *inverse logarithmic transformation, they are significantly asymmetrical with the range between the mean and the upper bound typically much greater than the range between the mean and the lower bound.

6.3 Implementation of Xu and Zhang (2,009) Method We applied the Xu and Zhang (2009) regression equations to Jocassee Dam to obtain the mean estimates of the breach parameters and to comparethem with the HDR estimates. We also estimated the confidence intervals on the :estimated breach parameters using .equations for the confidence intervals on a multiple regression that can be found in many textbooks (e.g. Haan 1977). To verify our spreadsheet for applying the Xu and Zhang regression equations we first reproduced, within a small round-off error, the mnean and confidence interval estimates that are presented in the Xu and Zhang (2009) paper for Teton and Banquito dams. we then unsuccessfully attemptedto reproduce the HDR mean estimates but after some additional checking the HDR estimates were revised. These final HDR estimates now closely match our estimates as is shown later in this section.

As discussed earlier, the Xu and Zhang equations incorporated the various erosion resistance categories (low, medium or high) based on the technical paper by Briaud (2008). Our interpretation, based on the rockfihl materials, compaction and density,, places the rockfill at Jocassee Dam between the very low and low erodibility categories (see Figures 4a and b).

Page .] 15

.';u LII f.~,... ~L1:~ ~ ThCFfl ~

Therefore, we recommend that the most appropriate and conservative breach parameters for Jocassee Dam should be based on using the low erodibility values.

Tables 1 and 2 show the input values and the breach parameter estimates from our application of Xu and Zhang (2009) to Jocassee Dam. Separate breach parameter estimates are included for the Best Exact and Best Simplified Prediction regression equations. Table 2 also includes a comparison with the final HDR mean estimates (in blue font) for low erodibility. A more detailed version of Table 2, which includes the values calculated for all regression parameters and references the regression equation numbers for the equations that we used from the Xu and Zhang (2009) paper, is contained in Appendix B.

Table 1. Input values used for Xu and Zhang (2009) application to Jocassee Dam.

Elevation Hw Reservoir Volume Iptft msl ft acre-feet Crest Elevation 1125 Reservoir Elev 1110 ______

Breach bottom elevation Low erodibility 870 240 1,091,716 Dam Height -Hd = 385 ft Hr = 15 rn Dam Type Homogeneous/zoned-fill Failure Mode Seepage erosion/Piping Table 2. Breach parameters estimates from Xu and Zhang (2009) application to Jocassee Dam with comparison to HDR mean estimates.

rodbiltyPramter Breah Man estExac PrdicionBest Simplfied Prediction Mea Mean 95% Confidence Interval Mean Mean 95% Confidence lnterval Category HDR* Lower IUpper HDR Lower Upper Height of breach, Nb ft. Low 255 253 168 337 255 255 176 334 Failure time, Tf hrs. Low J(b)(7)(F)

Breach top width, Btft. Low I 701 701 I 306 1,606 I 665 666 I 299 1,485 Average breach width, Save ft. Low I 566 566 I 246 1,3061 1S* 515 I 223 1,193 P~ealkoutfltow, Qpft3/sec., Low (b7)F

  • Note that HDR used the Best Simplified Prediction for Height of Breach instead of the Best Exact Prediction One reason for the small differences between the HDR estimates and our estimates shown in Table 2 is that HDR used the Best Simplified Prediction equation for height of the breach, Hb, in both the Best Exact and Best Simplified Predictions for the other breach parameters. We used Page I 16

IAJtlL.. Id1tri puli tli coorr nb 1*F 1 the separate Best Exact and Best Simplified Predictions of Hb for the corresponding Best Exact and Best Simplified Predictions, respectively, for the other breach parameters. HDR's approach was based on the higher R2 value obtained for the Best Simplified Prediction equation for Hb, wher~eas our approach followed the examples for Banqiao and Teton dams in the Xu and Zhang (2009) paper.

From Table 2 it can: be seen that using loweoibility in the Best Exact Prediction equations, the mean failure time is estimated to be about :the mean breach top width about 700 feet, the mean aVerage breach width about 570 feet, the mean height of breach about 250 feet, and the mean peak discharge undelJ IFcfs.

The confidence interval estimates for each breach parameter, are shown in Table 2 as lower and upper bound estimates that define the width of the confidence interval both below and above the mean estimat~es. Similar to the examples for Banqiao and Teton dlams, which we discuss in Section 6.2, the asymmetry in the confidence intervals can be seen for all breach parameters excePt height of the breach, which is symmetrical because of the additive form of the regression equations for height of the breach as explained in section 6.2. The symmetry in breach parameter estimates for height of breach and the asymmetry in estimates for failure time, breach top width, and average breach width can be seen in Figures 5a and b. In these figures the confidence intervals for breach parameter estimates for Jocassee Dam are plotted as a ratio to the mean estimate for the Xu and Zhang (2009) Best Exact and Best Simplified Prediction equations, respectively. The asymmetry in the confidence intervals for failure time, breach top width, and average breach width can be seen by the longer lines above the mean estimate.(plotted at a ratio =1.0 shown by the blue dashed line) than below the mean estimate.

In Table 2 we have placed boxes around the values of the breach parameters that we recommend as being most applicable to Jocassee Dam. These are mean estimates based on low erodibility. The basis for using low erodibility is explained earlier in this section and is basedon discussions in Sections 3.0 and 6.1. The basis for using mean estimates is discussed here.

In Section 6.2, we described Xu and Zhang (2009) mean and confidence interval breach parameter estimates for each breach parameter as follows:

  • Mean estimate: Based on applying a regr:ession equation to represent or "explain" the fraction R2 of the variability in the observed breach parameter values in the data set of historical dam failures in terms of the variation in the Values of the observed values control variables that were used to derive the regression equation.

Page 17

. .IU rI n* JIS- IJin ., U-S.

.,-; ).J t,.iir us s r, F us..i~,s ExactiPre :1 Best iCt IOflS 4.0 w 3.5 Cu 3.0 -I-Cu 2.5 E

w 2.0 Cu 0

I.

0

'a-.

1.5 1.0 0.5

_ Mean Estimates -1 Cu Height of breach Failure time Breach top width Average breach width Breach Parameter a) Best exact predictions Best Simplified Predictions 4.0 3.5 Cu

'I 0 3.0 w

4-.

Cu 2.5 w 2.0 Cu 1.5 0

4-.

1.0 w~I Mean Estimates 0

4-. 0.5 Cu Height of breach Failure time Breach top width Average breach width Breach Parameter b) Best simplified predictions Figure 5. Relative width of confidence intervals for Xu and Zhang (2009) breach parameter estimates for Jocassee Dam based on low erodibility expressed as a ratio to the mean estimate (ratio =1.0).

Page I 18

  • ju~t*l=lb u. ILy Q=I.IIU lIvl=a l",lul.Lv,
  • Lower and upper bound estimates (Confidence interval): Based on the variability between observed breach parameter values in the data set of historical dam failures that is not represented or "unexplained" by the regression equation for the mean value.

This unexplained variability is the fraction (1 - R2) of the .variability in the observed breach parameter values -in the .data set of historical dam failures.

Graphically one can picture the unexplained variability in breach parameter estimates as being a scatter of points about the regression line representing the actual .breach parameter Values.

A key question is, "Where would one expect Jocassee Dam to fit in the range of the' scatter or unexplained variation of breach parameter values for the data set of historical dam~failures used by Xu and'Zhang (2009):?" Based on the fact that Jocassee Dam is a well designed and constructed rockfill dam that has incorporated modern designi criteria and defensive design features (see Section 3.0) the breach geometry parameter estimates are expected to be in the range below the mean but above the lower bound confidence .interval estimates. Additional factors that support; this range of geometric, breach parameter estimates include the following;

  • Erodibility: Based on the discussion in Section 6.1, Jocassee Dam would be expected to be in the lower part of the range of low erodibility as defined in the Xu and Zhang (2009) implementation of the Briaud (2008) erodibility classification system.
  • . uni-directional breach formation: A breach from thevyer unlikely piping failure modes of piping through the foundation in't heb>;(F would star()7*

h a7TF am and can only progress of the dam and Ib7) piz!.E)" in contrast to developing in two directions for most historical breaches.

This would be expected to reduce the width of the breach because of the more erosion resistant and stablI~b(*F) Ion one side of the breach, in addition to slowing the breach development, with the result that the peak breach flow rate would be reduced.

  • Deposition of eroded rockfill material and development of tailwater: The rockfill material moved by the breaching process would simply ravel downstream by the flow through the breach, and much of this material would be deposited a short distance downstream of the dam. This would cause a significant tailwater to develop that Would reduce flow velocities through the breach and inhibit both downward and lateral development of the breach with the result that a narrowerbreach would be formed, taking a-longer time to form, and resulting in a lOwer peak breach flow rate.

The combination of all .these considerations provides strong evidence' that the use of mean values of breach geometry parameter estimates for Jocassee Dam Would be a conservative choice. In reality we would expect that the breach geometry, parameter estimates for Jocassee Page I 19

  • =.,o, * * * -
  • ntoinc uu.[,=,.uu ........

' ilS-i

  • ,.. m m.

. ..m .*

  • . I"l I'* *t'tt't
u. ,u*l .......
  • U IWVB 0 VVI Dam are in the range between the mean and lower bound confidence interval estimates obtained from the Xu and Zhang (2009) regression equations.

Similar arguments made for breach geometry parameter estimates for Jocassee Dam being in the range between the mean and lower bound confidence interval estimates can be made for failure time, except that they would support a failure time estimate between the mean and the J

upper bound confidence interval estimate. Therefore, the use of the mean estimate for failure time is also considered to provide a conservative estimate of the failure time as defined by Xu and Zhang (2009) for the reasons stated above.

6.4 Use of Failure Time Estimate in HEC-RAS Model for Jocassee Dam The importance of consistency between the definition of the Xu and Zhang (2009) failure time when using failure time estimates in the HEC-RAS breach model is pointed out in Section 5.0.

Figure 6 contains breach hydrographs for headwater (blue line related to left scale

  • 1,000),

tailwater (brown line related the left scale

  • 1,000) and breach discharge (green line related to the right scale) obtained by HDR for a piping failure of Jocassee Pam at a location immediately downstream of the internal boundary in HEC-RAS model that represents the darn. The rate of breach progression that is defined as a HEC-RAS input is shown by the black line (related to the left scale). Points A, B and D are equivalent to points that are defined in Figure 3 for the Teton Dam failure in Section 5.0.

To achieve a compatible implementation of the Xu and Zhang breach parameter estimates in HEC-RAS the Xu and Zhang mean breach failure time (between points A and D) and mean breach geometry estimates were input to the HEC-RAS model. The Xu and Zhang mean peak breach flow rate estimate was then closely matched by adjusting the piping coefficient to a value of 0.1, the breach weir coefficient to a value of 2.0, and the sinusoidal rate of breach progression relationship was. adjusted between points B and D as shown in Figure 6.

The adjusted values of these coefficients appear to be reasonable in terms of representing flow through the rockfill material and flow through the breach following collapse of the dam crest of the rockfill dam, respectively. In addition the form of the resulting breach hydrograph also appears to be reasonable for a piping failure mode and closely matches the Xu and Zhang mean peak breach flow rate estimate. We consider this to be a realisticbut conservative breach hydrograph that has good defendablity based on the validityi of the Xu and Zhang (2009) method, the conservative nature of the mean breach parameter estimates, a piping failure mode initiating in the abutment, the deposition* of rockfill immediately below the dam, the low erodibility of the rockfill material, and various characteristics of a modern dam thatwere include in the design and construction oQfJocassee Dam.

Page 120

.... ........*.. .... . .. ..... .orn" ooo*,

Jocassee Dam Breach Progression and Hydrographs SEP LIE 300,C)o000 I 2.500,000

  • '2.000,000 I

II 1040 a4 1,000,000 JO2 0 ,  : 500,000

.... 00 00 11/1/2006 12:0 11/1/2006160 11/2/20060o0

- t4.awater - TadwaterBeahPoru. - Breach Ocarg

- - - Breach tnatm.. -- -- P~p Cohap.. - - - Breach fo nr~t~ao. Compl~et Figure 6. HDR's HEC-RAS Jocassee Dam breach hydrographs 7.0 Review of Keowee Breach Parameters 7.1 Overview Section 7.2 provides a summary of some key features of Keowee Dam that affect its response to an upstream failure of Jocassee Dam. Section 7.3 is our review of the breach parameters proposed for Keowee Damn.

7.2 Keowee Dam The Keowee Dam is an embankment dam consisting Olb*F, F*7)F1 The embankment is approximately 3,300 feet in length and is confined between the r*T* la~nd the natural high ground forming ther'*i*' The crest is at EL 815 or 15 feet above normal Keowee Lake level of EL 800. The soil materials contained in heda aI~with regard to Briaud (2008) erodibility resistance categories used by Xu and Zhang (2009) as described in Section 6.1.

Given thei*'*n Iature of the Keowee Dam, overtopping if 'o resultin a dam breach regardless of the rate of rise of the headwaters. Given the fact that a Jocassee Dam breach would cause a relatively rapid rise in headwaters at Keowee, it is anticipated that Page I 21

the flood waters woul4b()*

I(L)(7)(F) If the embankment.

7.3 Breach Parameters for Cascade Failure of Keowee Dam The breach parameters for Keowee Dam should correspond to the breach process that would be expeCted to result at this dam for the breach flood wave from the postulated piping failure of Jocassee Dam. For overtopping dam failures, the empirical breach parameter methods, such as Xu and Zhang (2009), are based on case histories of overtopping dam failures resulting from natural inflow floods. These natural floods would be expected to have a slower rising limb than the flood wave generated by the failure of a major dam, such as Jocassee Dam. Typically a natural overtopping flood first results in overtopping of a low spot of the dam (accounting for wind and wave effects), or at a higher rate of overflow overtopping can occur at more than one low spot in the dam crest with lesser overflow overextensive portions of the crest. The rate of rise of the overtopping hydrograph for natUral floods is likely to provide opportunity for a breach to develop at one of these low spots, or as a result of vulnerable conditions on the downstream face of the embankment dam. As the breach development progresses more rapidly it typically draws down the headwater level to below the dam crest level and thus focuses all the available erosive energy on developing a single breach rather than developing multiple breaches along the dam crest. The interactions between potential breaches initiating at multiple locations along an embankment dam are not considered in breach algorithms such as that in HEC-RAS. They are considered in the physically-based models developed by Wang and Bowles (2006a-d, 2007).

'Incontrast to the typical overtopping breach process associated with a natural flood that is summarized in the previous paragraph. a rapidly rising hvdroeraoh resulting from the Upstream failure of Jocassee Dam wouldl (b)(7)(F) JKeowee Dam. This would be expected to not only, init~iate breaching at multiple locations alone the_ Lam crest. bu (b)(7)(F)

I(°'c'cF' Isince the initiation of breaches would likely not reduce the headwater quickly enough to focus flow into only a single breach. Thus, it is expected that following the upstream failure of Jocassee Dam, there would be-.a o)()F)f the Keowee Dam.

The approach implemented by HDR for an overtopping failure of the Keowee Dam .resulting from the postulated upstream piping failure of Jocassee Dam is as follows:

1. a trapezoidal breach of the main high section of Keowee Dam represented using the HEC-RAS breach algorithm with an average breach width of almost 900 feet, a failure time oj~)F J and a Sinusoidal breach progression relationship; and Page I 22
2. an almost 1,900 feet wide rectangular "gate"* in the west saddle dam that opens in 30 mains. to simulate the breach developing over essentially the entire remaining length of Keowee Dam.

This dimensionand failure time used to represent the breach of the highly erodible Keowee Dam appears to be reasonable for the rapidly rising overtopping flood wave resulting from the upstream failure of Jocassee Dam based on the considerations discussed above. The Dam Overtop TriggerElevation of 817 feet msi corresponds to two feet of overtopping of Keowee Dam, which is likely much more overtopping than this highly erodible dam would withstand for this cascade failure mode. However, this trigger elevation can be viewed as a conservative assumption in the sense that the higher headwater and greater volume stored behind Keowee Dam for this trigger elevation would result in a higher peak breach flow rate downstream.

The HEC-RAS breach hydrograph provided by HDR for the cascade failure of Keowee Dam shows a very rapidly rising limb consistent with the failure times selected and the assumed breach dimensions that represent removal of most of the main embankment dam at Keowee..

In conclusion, the proposed _breach parameters for Keowee Dam appear to be reasonable given the cascade failure mode and non-applicability of the empirical breach parameter estimation methods to this type of failure. Physically-based breach models '(Morris et al 2012) may provide some useful insights into the rate and extent of development of the Keowee breach in the longer term.

8.0 Conclusions

.For Jocassee Dam:

  • Given the design, construction and excellent performance of the Jocassee Dam it is concluded that a piping failure of the Jocassee Dam is extremely unlikely to occur.
  • Even in the extremely unlikely event that a piping failure mode initiates at Jocassee Dam, the potential for uncontrolled release of the Jocassee Reservoir through failure of the main section of Jocassee dam is even more remote. This is because the potential internal erosion and piping would progress very slowly, due to the protective filtering systems and/or the resistance of the rockfill to movement and collapse. The present monitoring and observation procedures and systems would indicate movement of materials and would give cause and time for intervention. This intervention could be

[b)(7)(F)I Page 123

fnecessary, it could also be accomplished through acDT'FI I°lx

[jthat would result in a flow rate that could be managed at Keowee Dam without threat to the Oconee N.S.

  • The Xu and Zhang (2009) method that has been applied for Duke by HDR to estimate breach parameters for Jocassee Dam has been demonstrated to provide the best predictions of breach parameters amongst similar regression methods. it is, therefore, considered to be a "state-of-the-practice" published regression method for estimating piping dam breach parameters. Unlike most other methods, it includes erodibility as a control variable. This variable was found to be the most important variable in the regression Xu and Zhang (2009) method. The capability to consider erodibil ity is particularly important given that the dense rockfill in Jocassee Dam would be conservatively classified as low erodibility. See Figures 4a and b.
  • A review of the analysis performed by HDR indicated that calculations using the breach parameters with consideration of "low erodibility" for the rockfill Jocassee dam reduces the mean estimates of the breach size and peak discharge and increases the failure time considerably compared with previous estimates based on other methodS. These low erodibility mean estimates of the breach parameters are associated with the low erodibility of a rockfill dam, and they are considered reasonable and even conservative for Jocassee Dam. They are conservative because of the low to very low erodibility properties of Jocassee Dam such that it would be expected to be a more resistant dam to the breach process than Other low erodibility dams for which failure data were used by Xu and Zhang (2009). In addition, the uni-directional breach formation, deposition barrier of moved rockfill material and development of tailwater during breach formation would lead to conservative estimates of breach parameters using the Xu and Zhang (2009) mean estimates.

For Keowee Dam:

  • The proposed breach parameters for Keowee Dam appear to be reasonable given the cascade failure mode and non-applicability of the empirical breach parameter estimation methods to this type of failure.

Page 1 24

.'~Wtzii from putlic d I r 1:r iocrn 2.300.

9.0 Recommendations The following recommendations are made based on our review:

1. We recommend that the Xu and Zhang (2009) breach parameter estimates for a piping failure of Jocassee Dam should be based on low erodibility mean estimates (see values in boxes in Table 2) as realistic but conservative values.
2. We recommend that the breach parameters proposed by HDR for Keowee Dam should be used as realisticbut conservative values for a cascade failure of that dam as the result of the failure of iocassee Darn.
3. While the Xu and Zhang (2009) regression equation approach presented herein is presently the "state-of-the-practice" and provides for the appropriate range of breach parameters to represent a piping failure at Jocassee Dam; in the longer term, we recommend that future consideration be given to a physically-based model. When available, this type of model may provide additional insights to better define the conservative nature of the present evaluation by considering the material properties, site geometry, reservoir capacity-stage relationship, the Uni-directional breach development starting at a relatively high elevation in-l TF 'and other factors such as the effect of the tailwater development due to deposition of rock downstream of the breach. It is recommended that the application of this type of model should be considered using bounding values of model inputs to better understand and appreciate the beneficial nature of the physical features on limiting breach development for the Jocassee Dam.
4. For Keowee Dam, in the longer term, we also recommend that future consideration be given to a physically-based model. This type of model may provide additional insights considering the characteristics of a Jocassee breach flood wave arriving at Keowee. It is recommended that the application of this type of model should also be considered using bounding values of model inputs to better understand the physical limitations on breach development for the Keowee Dam as a validation of the estimates reviewed in this report..

We note that at present the HR-BREACH physically-based breach model, which could be applied in the future in response to Recommendations 3 and 4, is undergoing further development and testing for a piping failure condition for a zoned rockfihl dam, such as Jocassee; however, in the future such research and verification may be available.

Page I 25

~Ait~d rm bi 1rlovr * 'n I*doII lCFlP*' 2 10 10.0 References Briaud, J. L. 2008. Case Histories in Soil and Rock Erosion: Woodrow Wilson Bridge, Brazos River Meander, Normandy Cliffs, and New Orleans Levees. Journal of Geotechnical and Geoenvi ron mental Engineering, 134(10): 1425-1447.

Fell, R., Wan, C. F., Cyganiewicz, J. and Foster, M. _2003. Time for Development of Internal Erosion and Piping in Embankment Darns. Journal of Geotechnical and Geoenvironmental Engineering, 129(4):307-314.

Findlay Engineering. 2004. Potential Failure Modes Analysis (PFMA) for Jocassee Dam.

Conducted for Duke Hydro for submission to the FERC.

Foster, M.A. and Fell, R. 1999. A Framework for Estimating the Probability of Failure of Embankment Dams by Piping Using Event Tree Methods. UNICIV Report No. R-377.

School of Civil and Environmental Engineering, The University of New South Wales.

ISBN: 85841 343 4.

Froehlich, D. C. 1995. Embankment Dam Breach Parameters Revisited. Proceedings, Water Resources Engineering, 1995 ASCE Conference on Water Resources Engineering, ASCE, New York. pp. 887-891.

Haan, C.T. 1977. Statistical Methods in Hydrology. Iowa State University Press.

Leps, T.M. 1973. Flow Through Rockfill. In Embankment Dam Engineering - Casagrande Volume, John Wiley & Sons, New York, by R. C. Hirschfeld and S. J. Poulos. pp.87-107.

Morris, M.W., H-assan, M.A.AM., Wahl, T.L., Tejral, R.D., Hanson, G.J. and Temple, D.M. 2012.

Evaluation and Development of Physically-Based Embankment Breach Models.

Proceedings from the FLOODrisk 2012 Conference.

Reclamation-USACE-URS-UNSW. 2008. Piping and Seepage Toolbox.

Sowers, G.F. 1987. Jocassee Main Dam Design, Construction and Performance. Report to Design Engineering Department, Duke Power Company, Charlotte, North Carolina. April.

Wahl, T. 1. 1998. Prediction of Embankment Dam Breach Parameters--A Literature Review and Needs Assessment. Dam Safety Report No. DSO-98-004, U.S. Department of the Interior, Bureau of Reclamation, Denver, Colorado.

Page I 26

Contains becunry oensiuv{ I!ItUII.=lullI Wahl, T. L. 2012. Several verbal discussions with J. 1. Ehasz regarding the use of the Xu and Zhang technical paper as well as Verbal discussions of erodibility factors as related to rockfill dams.

Wang, Z. and Bowles, D.S. 2006a. Overtopping Breaches for a Long Dam' Estimated Using a Three-Dimensional Model. Proceedings of the 2006 USSD Annual Lecture, San Antonio, Texas. June.

Wang, Z. and Bowles, D.S. 2006b. Dam Breach Simulations with Multiple Breach Locations Under Wind and Wave Actions. Advances in Water Resources, 29(8):1222-1237.

Wang, Z. and Bowles, D.S. :2006c. Three-Dimensional Non-Cohesive Earthern Dam Breach Model. Part 1. Theory and Methodology. Advances in Water Resources, 29(10):1528-1545.

Wang, Z. and Bowles, D.S. 2006d. Three-Dimensional Non-Cohesive Earthern Dam Breach Model. Part 2. Validation and Applications. Advances in Water Resources, 29(10):1490-1503.

Wang, Z. and Bowles, D.S. 2007. A Numerical Method for Simulating One-Dimensional HeadCut Migration and Overtopping Breaching in Cohesive and Zoned Embankments. Water Resources Research, 43(5):W05411.

Xu, Y. and Zhang, L;M. 2009. Breaching Parameters for Earth and Rockfiil Dams. Journal of Geotechnical and Geoenviron mental Engineering, 135(12): 1957-1970.

Xu, Y. 2010. Analysis of Dam Failures and Diagnosis of Distresses for Dam Rehabilitation. Ph.D.

Thesis. The Hong Kong University of Science and Technology. January.

Page 1*27

Appendix A Descriptions of Potential Piping Failure Modes for Jocassee Damn The potential piping failure modes identified for Jocassee Damn during the RAC PFMA are summarized below followed by a comment on breach by sloughing and unraveling.

JPFM 5a1: Piping Tholhthe Foundation (Natural Dam) in thl*('F The location of JPFM 5a1 iS in thei lFrea 'where there is no rockfill dam and a "Natural Dam" overlying the bedrock foundation retains the reservoir. Figures A.1 and A.2 show sections through theiL>71(F> If the main Jocassee Dam. The section forms a "Natural Dam" in the locations where the ground surface of the section is above the dam crest elevation. The location of this "Natural Dam" section is shown on Figure A.3 and labeled as "JPFM 5a1". The failure mode is summarized in the following two paragraphs.

The reservoir rises to a critical level at which time a seepage path develops through fracturesin the weathered rock. The seepage passes into the residual soil which forms the downstream slope of the natural dam. The seepage initiates movement of the residual soil as well as infilled soil in the joints and fractures of the weathered bedrock.

The eroding material moves toward an unprotected exit near the toe of the natural dam and beyond the core/cutoff trench of the rockfill dam; the unprotected exit allows the movement of material to continue. As the infilled joint material continues to erode the seepage velocities and the flow rate increase. The fractures remain open and the internal erosion process progresses. The process may or may not be detected but successful intervention does not take place. The internal erosion process eventually begins to increase uplift, pressures under the downstream slope of the natural dam causing sloughing or slope instability to occur.

JPFM 5a2: Piping Through the Foundation Near tht('('F' Failure mode JPFM 5a2 is in theli'7 F rea but is located Where there is aS(*F;1(

section of the rockfill dam overlying the bedrock foundation. If the same mechanism described above for failure mode JPFM 5a1 occurs at a location Where the Main Dam is underlain by the natural dam then the seepage may exit into the Rockfill shell of the main dam and cause failure of the dam by unraveling. At this location the main dam is abou4D)°F) IThe location Of Page 128

Figure A.11()7F lsection (from page 1 of 3 of the HDIF(b)7)* IGeological Study).

Figure A..Sketch of piping through rock foundation in th*(j()(F) j failure mode JPFM Sa-1.

Page 129

m i ii i

  • il J* *,Ji *t7 Figure A.3. Google view showin te lo~cations of failure modes JPFM Sal, 5a2 and 3 in th***

thi'bTF 'is shown on Figure A.3 and is labeled as "JPFM 5a2." The process of piping through the foundation for JPFM Sal and 5a2 is essentially the same. For both cases the flow is through joints and fractures in the bedrock, eroding infilled material, and does not emerge from the bedrock fractures until well downstream beyond the location of the cuof tenh ndcore projected into th{°z -"The j primary difference between JPFM Sal and 5a2 is that for JPFM 5a2 the seepage exits from the foundation into the downstream rock shell of the dam causing unraveling 1 of the shell, and for JPFM Sal the seepage exits from the foundation into the downstream natural slope causing sloughing and slope instability.

'Comment on breach by sloughing and unraveling "Forbreach to occur by unraveling or sloughing of the downstream face of the embankment, the increased seepage due to internal erosion and piping in the foundation would hove had to dischargeinto the downstream zone as shown in the figure below.

For sloughing to occur, the downstreamface would hove to be relatively steep, and the shoulder material a cohesionless soil, probably sandy grovel, or gravely sand, possibly with some silty fines. The process would have to be allowed to continue until it gradually eroded away the crest and allowed the reservoirto overtop.

Unraveling usually relates to the progressive removal of individualrocks by fairly large seepage flows flowing through the downstream rockfill. Fosterand Fell (1999) indicate that in the database they assembled, there was only one case of piping failure in an embankment with breach by unraveling (After Reclamation-USACE-URS-UNSW 2008).

Page I 30

JPFM 5b: Piping Through the Foundation (Natural Dam) at the Inrte.rf=e..Be*÷ween the Weathered Rock in th e 1 land the Core Material The failure mode in the Piping and Seepage toolbox that fits this failure mechanism the best seems to be piping through the embankment Initiating Mechanism IM15. The following sequence of events describes this failure mode:

1. Occurrence of a threshold pool level which creates a gradient greater than the crtia

[*),)raien o creor foundation material that exists at the interface between th*(~()

foundation material.

2. A seepage path exists along the interface with the select core material.
3. Movement of the select core material initiates.
4. The select core material moves into an exit point beyond the flared filter material and into the rockfill shell or the downstream face of th ej~j)()F /
5. A pipe (crack) develops in the select core material or the residual foundation soil material and progresses upstream to the upstream shell.
6. The core material is capable of supporting a roof and does not collapse into the pipe (crack).
7. Core or foundation material continues to move through the pipe (crack) in the select core material.
  • "
  • SEEPAGE INTO
  • ~SEEPAGE FROW

- E

\..PIPE, OR ZONE J_

OF SUFFUSION Breach by unraveling or sloughing of the downstream slope (ReclamatIon-USACE-URS-UNSW 2008).

Page 1 31

vwiu ;V*IU 1'u- vu ,* ,*..=, * ...............

8. The upstream filter material fails to fill the pipe (crack) and to plug the exit into the downstream shell.
9. The seepage may or may not be detected but intervention is not successful.
10. A breach develops by sloughing and unraveling or by sinkhole development.

JPFM A. ptnibzaTrnah Rock Foundation inth hjJ*F, The description of the piping mechanism for piping through the rock foundation in thJ'*'"J I of the dam in the locatio hwniFiuel A.4 is essentially the same as for the piping failure mode JPFM 5a2 in th* of the dam. Figures A.1 and A.2 for the JPFM 3: Piping Through Embankment For this failure mode the initiation of the flaw occurs by "Cross Valley Differential Settlement" as described by the initiating mechanism IMi in the Piping and Seepage Toolbox. The schematic drawings of the failure mechanism in the toolbox are shown below as Figures A.5 and A.6.

Figure A.4. Location of foundation oioinf failure mode JPFM 4 in th Page 1 32

Figure A.5. Location of the transverse crack in the upper third of the dam section.

LMI - Cro-s "*'alUe Differntia Settlement Figure A.6. Cross Valley Differential Settlement causes transverse cracking in the upper third of the embankment.

The reservoir rises to a critical level to initiate seepage through a crack in the core caused by Cross Valley Settlement (Initiating Mechanism IMi). There is sufficient velocity flowing through the crack that core material along the sides of the crack begins to move toward the downstream side of the core. There is a flaw in the filter that aligns with the crack so that the material is not stopped at the filter. Erosion continues to occur and material from the upstream filter does not fill the crack. The internal erosion is not detected and continues to develop. As the material erodes, a void develops in the core material. The void eventually collapses and a sink hole develops at the crest of the dam or upstream of the crest. The process may or may not be detected but successful intervention does not take place. Breach of the damn occurs by sloughing or unraveling or by sinkhole development.

The location of a breach for an embankment piping failure mode would occur near th*<j*T)J i twere there is a break in grade in the foundation profile as schematically shown- inI Figure A.6. The same discussion as given in the footnote on breach by sloughing and unraveling for failure mode JPFM 5a2 applies to this embankment piping failure mode.

Page I 33

Appendix B Breach Parameters Estimates from Xu and Zhang (2009) Application to Jocassee Dam with Comparison to HDR Mean Estimates Best Exact Prediction Best Simplified Prediction Zone-filled Dams b3 0.132 Piping h4 0,236 Height of breach, Hb ft. !Eqn. 9 Low b5 0.031 IiI2i5 253J 168 337 Low C1 0.858L 255, 255 176 334

(.b)(7)(F)

Falilure time, Tif hrs.

Zone-filled Dams b3 -0.089

'Piping b4 -0.239 Piping b4 "-0.262 Breachbtop width, Btft. Eqn. 14 tow b5 -O.289 970 701 306 1,606 Low b5 -0.2 2 8 8j6 J 299 1,485

'" Zone;filied Dams b3 -0.226 Piping b4 -0.339 Piping .b4 -1.747 Average breech width, Dave ft. Eqn. 15 low b5 -0.39 1[ZZr* lZ s] 246 1,306 Low bS -L26L 515 515 223 1,33

(*b)(7)(F)*

Peak outflow, Qp ft3/sec.

Note that HDR used the Best Simplified Prediction for Height of Breach instead of the Best Exact Prediction Page 1 34

  • ,,,,,-'-;,,p Sr.u.*uIy S',.,mIuv uu *ormduon.

WltrnnOlia from pUDIIC alSCIOsure unaer lU,** £;.*w.

ENCLOSURE 2-Board of ConsultantslFERC EFM Review Meeting report

WItflnROI from pUDIIG aiSClosure unouri Iu*.,rz L:.3u.

J. Michael Duncan, Pht. D., P.E. James F. Ruff, Pht. D., P.E.

Civil Engineer Civil Engineer 1600 Carlson Drive 1015 W. Mountain Avenue Blacksburg, VA 24060 :_otClis.C 0sr jmd@vt.edu b)6/

Gabriel Fernandez, Ph.D., Gonza/o Castro, Ph.D., P.E.

Geotechnical Consultant Geotechnical Consultant 207 Sherwin Circle 1Muster Court Urbana, IL 61801 Linton* MA 02420 gfernand@illinois.edu b)6 April 4, 2013 Duke Energy Oconee Nuclear Station Attn: Mr. Curtis Arnold Mailcode: ON02TH 7800 Rochester Highway Seneca, SC 29672

Subject:

Oconee Nuclear Station Board of Consultants/FERC EFM Review Meeting March 12-14, 2013

Dear Mr.Arnold:

INTRODUCTION The subject of the Board meeting consisted of the potential effects of a "sunny day" failure of Jocassee Dam on the Oconee Nuclear Station (ONS) and the protection measures being designed to protect the Station. The prote~res that were discussed are based on certain breach parameters that resulted in a failure time o 4lI

.... refer to herein as "current" breach parameters. The Board response to Question 1 deals v~w~ suay of alternative breach parame~rkon~nducted by Duke Energy and its consultants that leads to substantially longer failure time o01..... Ireferred to herein as "new" breach parameters  !

The Board responses to Questions 2 through 6 address the investigations and analyses required for the necessary modifications to protect the Oconee Nuclear Station against flooding caused by a falr j~gee Dam, assuming the current breach parameters of the dam consistent with a failure time o*¶~

Li)Duke Energy refers to the use of the current parameters as path]1.

BOARD QUESTION 1: Are breach parameters reasonable?

Mr. Culrtis Ar'nold 1111UUIl, vvI[FlflUI*IOIU , UIbUlUbUlt* UllU~1 I u*.ri* S.V..

April 4, 2013 Page 2 The Board of Consultants has been asked to comment on the new breach parameters for Jocassee Dam based upon information provided by Duke Energy and CB&l.

Field trips were taken to the dam sites. Presentations were given of the computer simulations of potential failure of Jocassee Dam and the routing of the flood through Lake Keowee and Little River. Runs were made using I-D and 2-D HEC-RAS routing along with several scenarios of the breach parameters. The breach parameters considered were those of Froehlich (1995) and Xu and Zhang (2009). The Board considered the Xu and Zhang parameters to be "state of the art" based on their more extensive data of dam failures and breach development. Xu and Zhang found dam erodability to be the most important control variable for predicting their breach parameters, which had not been considered in the current breach parameters that led to th (b)(7)(F) [failure time. Noting that Jocassee Dama has been monitored since 1972 when it was constructed, thiere is no indication of excessive seepage that would indicate potential piping or movement of any soil or internal erosion. . Ehasz and Bowles (2013) evaluated the Xui and Zhang breach parameter~s with respect to Jocassee and Keowee dams. They reported the breach parameter of low erodability as estimates for Jocassee Dam would provide a conservative estimate of the failure time as defined by Xu an Zhang. The Board agrees with the low erodability assessment for Jocassee Dam.

As noted by Ehasz and Bowles, the failure times for the current and new parameters are not defined in the sammnnr.The failure time o (b)(7)(F) Ifor the current parameters is defined in accordance with Froehlich and corresponds to the period of time during which the great majority of the outflow takes place. The failure time o or th nwbech parameters follows the Xu and Zhang definition that includes the total time for the breach development phase. The new parameters would have a failure time of aboufbl7TF? [using the Froehlich definition.

  • The Board is not aware of any piping failures in properly constructed central core-rockfill dams that have been in operation successfully for extended periods of time, i.e. 40 years with a relatively constant net head. Furthermore, the breach parameters evaluated by Xu and Zhang as well as those determined by Froehlich are related to the "development phase of the breach", which takes place once the piping process has advanced sufficiently to trigger sliding, sloughing of the shells'and breaching of the core. However, in our case it might be pertinent to review the history of the Jocassee dam performance to comment on the "warning phase" during which the piping process is .initiated and developed. The Jocassee dam reservoir was filled in 1972 and most seepage detected corresponded to abutment springs in the upper 100 ft below reservoir level. Leakage in th has remained astdyflow of about 2.0 to 30 gpm. On the px~xF) leakage is higher. 700 to 800 gpm, and increased only during two episodes in 1977 and 1978, when seeping water with concurrent development of subsidence features were detected on the right abutment downstream of the dam axis. In both cases it was determined that seepage took place through soil-filled joints in partially weathered rock. Additional grouting with sodium silicate was carried out in the affected areas, seepage was substantially reduced and has remained constant to date. Also, filtered wells were installed in the subsidence areas. It is pertinent to note that during the 1978 subsidence event the reservoir level was lowered 15 ft below nornial pool level as a precaution. The volume of water released corresponded to a significant portion of the total reservoir volume.

In the board's view, the dama performance to date indicates that:

'..,.'I I.~II IO O.I:,l ILy 01: IbILiVq= II ilJi II IdLIUU[l.

M .Curtis Arnold .......... T ... ..... ........ ~~ ,,,r,.C 1 ,,

April 4, 2013 Page 3 a) Unusual seepage events were promptly detected and timely and successful intervention was implemented. The springs appeared in the right abutment rock, about 300 ft downstream of the crest of the dam.

b) The "preferential seepage paths" susceptible to piping developed mostly along in-situ, weathered, materials, outside the footprint of the dam; and took place over an extended period of time that allowed for a lowering of 15 ft of the reservoir level.

c) The preferential paths have been grouted & plugged successfully since no seepage increase has been reported after 1978.

d) The areas of concern are heavily instrumented, i.e. piezometers and weir instruments Based on these considerations, it is plausible to argue that installation of automatic data loggers in the existing instruments, combined with frequent inspections would allow for a timely detection of signs of distress. An action plan can be implemented to initiate spillway discharge to reduce the reservoir volume prior to an eventual "dam breach" which wvill significantly ameliorate the impact on Keowee Darn and the Oconee Nuclear Station. The potential for reducing the reservoir level is not considered in the breach parameters estimates and thus it further supports the fact that the new "breach parameters" are conservative.

Breach Development phase- A revised 'breach failure time ofIZ~has been proposed for Jocassee Dam. A relevant precedent to support this assessment can be the failure of Hell Hole Dam in California in 1964. The dam was designed as inclined- core rockfill dam. In December 1964, the last lift of dumped rockfill, 220 ft high (crest elevation 4470 ft), had been placed when an intense storm deposited 18 in. of rain at the dam site. The core, at a lower elevation than the crest was overtopped at 1:30 pm on December 21 and flow commenced through the rockfiii; water emerged from the downstream toe at 3:00 pm on December 22, and a maximum water level was reached at 8:20 am on December 23. By 3:30 pm on December 23, most of the water impounded behind the rockfill had flowed through the washout removing about 700,000 cu yd of rock downstream. A conservative assumption for the breach initiation when the flow emerged at the downstream toe would result in a 24 hour2.777778e-4 days <br />0.00667 hours <br />3.968254e-5 weeks <br />9.132e-6 months <br /> long breach time for the 220 ft high dumped. rockfill at Hell Hole Dam. Jocassee Dam has a higher height of breach, 255 ft, but the rockfill was compacted i]b()F'which makes it more resistant to erosion, although the Hell Hole rockfill size was larger. More significantly however, Jocassee Dam volume is 11,000,000 cu yd, which is an order of magnitude lagrthan the Hell Hole Dam removed volume. This comparison is quaitaivebut indicates that th* I(F~

breach time proposed for Jocassee Dam is conservative.

Since Jocassee Dam has been operating and has been monitored since 1972 and will continue to be monitored and inspected, the Board considers the Xu and Zhang breach parameters that result in the longer breach hydrograph period are conservative for routing the flood downstream through Keowee Dam.

BOARD QUESTION 2: Please comment on the proposed subsurface investigations. What modifications do you suggest for the proposed investigations?

The proposed field and laboratory geotechnical investigation programs for the ONS and for Keowee Dam

Mr.,Curtis Arnold ~ f..~I~£~ .~ or April 4, 2013 Page 4 are reasonable and should provide the parameters needed for the design of the Fukushima External Flood Mitigation Project (EFM), path I. Like any geotechnical investigation one should adjust the program as information is developed. Given the time required to perform additional subsurface investigations because of site clearance needs, in the Board's opinion the scope of the initial program is appropriately more extensive than would likely be eventually needed. We suggest replacement of some of the borings with CPT soundings. For example along the crest of the intake canal dike one could add CPTs next to two of the proposed borings for the purpose of calibrating the soil classification inferred from the CPTs. Then the rest of the borings could be replaced with CPTs assuming that the two pairs of Borings/CPTs indicate soils which lend themselves to CPT soundings.

It might also be useful to review existing records of embankment materials testing during construction, i.e. grain size distributions, compaction tests, in-situ permeability tests and other field observations. Also the specification requirements for placement of embankment materials should be reviewed. Also, it would be useful to have for Keowee Dam a description of current embankment conditions, including pertinent cross-sections with seepage line elevations. During the site visit it was noticed that the seepage line intersected the downstream slope above the toe, eseilyin an area near the wvest corner.

sepae asalso observed in the rock cut at the[(bj 7)(j-Sigifcan "This information may be helpful in selecting critical areas for additional exploration.!

Also, it would be beneficial to have:

a) The estimates of the current factor of safety of the embankment slopes.

b) The range of actual fluctuations of reservoir pool elevation since operations started.

c) Estimated peak ground accelerations during the 1979 earthquake.

d) History of concrete spillway discharge to help assessing the potential for erosion downstream.

BOARD QUESTION 3: Please provide your input for our in-process documents on safe drilling procedures near dams and contingencies for appearance of internal erosion and excessive borehole sloughing.

The proposed in-process procedures address cases in which boreholes encounter artesian conditions or loss of drilling fluid and the responses to these conditions while drilling and while grouting. The proposed actions are reasonable. It should be made clear that the documents address the responses of the field engineer/geologist and not of the driller, and that the action of "calling Engineer" refers to the Engineer in overall charge of the geotechnical work for the project. The field engineer/geologist should have the primary responsibility to monitor that proper drilling procedures are followed and to detect any unusual events, and should be familiar with the main objectives of the investigations, drilling procedures in general and the specific requirements for drilling in embankment dams.

While the responses to artesian conditions are well planned, it is important to anticipate and plan for their possible occurrence. Artesian conditions are not likely to be found when drilling from the crest of the embankment but can be found when drilling at the downstream toe. Such a condition can be anticipated if there is "knowledgeof piezometric levels at the location of the proposed borings. If there are existing piezometers their readings should be reviewed. If there are no piezometers in the general area, we suggest

I~l nU "l n I "l" iEV i" i i-Mr. Curtis Arnold VVL,,,,I,,U £,I,, *,........ ... l.. .Zl... .

April 4, 2013 Page 5 that a CPT sounding with pore pressure measurements capabilities (piezocone) be pushed stopping at various depths until the pore pressure reading stabilizes. In this manner one would get a clear picture of the piezometric conditions and whether there is a vertical gradient, and specifically whether artesian conditions exist at any depth, and if so how high above the ground surface would the water level in the borehole rise. Then drilling can be made with the appropriate length of casing above the ground surface to prevent flow from the ground into the borehole. The CPT equipment should have the capability of grouting as the CPT is withdrawn.

Loss of drilling fluid can occur when either the boring encounters very pervious materials or the pressure in the drilling fluid become high enough to cause cracks to develop in the ground. Losing drilling fluid into very pervious materials can be stopped by driving casing below the bottom of such materials before recharging the borehole with drilling fluid. There are no significant consequences to such loss of fluid if it is detected quickly and prompt action is taken. On the other hand loss of fluid due to cracking of the ground should be avoided, particularly within the body of an embankment dam or in its foundation. If safe drilling procedures are followed, cracking of the ground is highly unlikely. General recommendations for drilling in embankments are presented in Thle Corps of Engineers publication ER-I1110-1807 "'Engineering Designa Procedures for Drilling in earth Embankments". It is recommended to use casing and to keep the casing no more than 5 ft above the bottom of the borehole to minimize the area of the embankment soil on which the drilling fluid pressures are applied. It is important to keep the drilling pressures at the bottom of the borehole at a minimum. One of the causes of excessive drilling fluid pressures at the bottom of the borehole is blockage to the flow of the return of drilling fluid, thus return should not occur along the outside of the casing since this annular space can be easily blocked.

Return should be between the drilling rods and the casing. Advancing the borehole too fast in clayey soils can result in clay chunks in the return fluid that can block the annular space between the drilling rods and the casing and lead to high drilling pressures. The COQE publication recommends that the borehole be advanced no faster than 1 ft/min. It is important to monitor closely tihe pressure at which the drilling fluid is being pumped into the drilling rods, any sudden increase in pressure may be an indication of blockage and thus the advance of the borehole should be stopped until the pressure returns to normal levels.

Rapidly raising and lowering the drilling rods should be avoided because it causes a pumping action with increases in drilling fluid pressure at the bottom of the borehole.

Cracking is more likely when drilling through the emba"nkment in areas where the horizontal normal stresses on upstream-downstream vertical planes can be expected to be lower than for at- rest conditions, and thus it is prudent to avoid drilling at such locations. Such locations can be identified by examining a longitudinal profile along the crest of the darn and the change in the height of the dam and in the depth of compressible soils beneath the dam, if any. For this purpose an example of soils to be considered compressible would be clays that are normally consolidated or become normally consolidated under the weight of the dam. At locations where the height of the dam or the depth of compressible soils changes abruptly there would have been significant differential settlements along the dam during construction which would have reduced horizontal stresses and thus drilling should be avoided anywhere close to such locations. It is not possible to develop rules that would quantify what an abrupt change is since it would depend on how compressible the embankment material and foundations soils are and the length over which the abrupt change occurs. For the general conditions where borings are planned for the EFM project a depth change with a slope of more than about 2H: 1V may be considered abrupt. The Board

Mr Crts rnld vvl.u~ hfi ui.u,*uuIu*7;.;.

-u-*

Apr.Ctis A4odV 2013i~ll~UIIL I UU~UIL~ I~r Page 6 examined the longitudinal profile for the West Saddle Dam and Keowee Dam and in our opinion no such locations are present. The Board recommends that the longitudinal profile along the Intake Canal Dike be examined for potential conditions unfavorable for drilling.

BOARD QUESTION 4: Given flooding defined in the SER, is RCC overtopping protection feasi ble and can it be implemented safely on an embankment retaining a normal pool with a functioning powerhouse? Should tihe design team consider other overtopping protection methodologies?

The Board believes that R.CC slope protection can be constructed on the downstream slope and the crest of Keowee Dam without damaging the embankment, provided that the wvork is done with appropriate care. The RCC armoring layer should be constructed on a permeable bedding layer to prevent uplift pressures beneath it. The upstream edge of the RCC armoring layer on the crest of the embankment can be protected against uplift due to water pressures beneath it by tying it into a row of driven sheet piles along the upstream edge. Using sheet piles for this purpose rather than a concrete wall will avoid having to excavate into the top of the dam. At the lower edge of the armoring layer on the downstream slope, the RCC can be extended horizontally beyond the toe of the embankm~ent to form a stilling basin of appropriate length. The downstream end of this stilling basin can be protected against back-cutting erosion by a row of driven sheet piles. This row of sheet piles should have "windows" formed by omitting every third or fourth pile, or by using shorter piles at the same intervals to avoid blocking flow within layered soils beneath the slab. Drain holes through the stilling basin, angling upward in the downstream direction, will prevent buildup of uplift pressures beneath the RCC slab.

For the design of the RCC overtopping structure it is important to avoid that the overtopping protection spillway begins operation before the original capacity of the service spillwvay is achieved. In the Board's view, we should try to maintain the current crest of the embankment constant to maximize the hydraulic capacity of the existing spillway before operation of the RCC overtopping structure is triggered. The installation of the overtopping structure can lead to introducing a new potential mode of failure, embankment erosion, for a more frequent event than the maximum capacity of the existing service spillway. In this regard, the RCC design should also consider the operation of the RCC overtopping protection structure for floods with return periods shorter than those anticipated with the Jocassee dam failure.

While other overtopping protection technologies such as riprap could also provide resistance against erosion, the Board believes that armoring the embankment with RCC will afford robust erosion protection, and is a more appropriate choice considering the high flow velocities associated with the postulated overtopping event.

BOARD QUESTION 5: What analyses are critical to the design of these modifications? What analysis methods and design standards does the Board recommend?

Safe design of the proposed modifications will require several types of geotechnical analyses, including those listed below. The Board recommends the following analysis methods, and the use of design standards in accordance with the practices and policies of the U. S; Army Corps of Engineers:

Mr. Curtis Arnold -;L......... ...... i; .....

i~ .. ..... io...

April 4, 2013 Page 7

  • Evaluation of precedent. Key parameters for the proposed overtopping structure, including the maximum unit discharge, cfs/ft, maximum overflow height, and Maximum height of dam. These need to be compared with performance of observed precedent in other RCC overtopping structures.
  • Slope stability. Limit equilibrium analyses using two computer programs, such as Slope/W and SLIDE are suitable for slope stability analyses. Using two programs is recommended as the most effective and efficient method of checking results. The Keowee reservoir loading surcharge triggered by failure of the Jocassee dam is " "pressures within the embankment. Given the existing high seepage line an (b)(7)(F) it would be pertinent to make sensitivity analysis to assess the factor of safety of the downstream slope. If the RCC is included in the stability analysis it should be assumed that the RCC is cracked and its strength is only the frictional resistance..
  • epg. Finite element seepage analysis programs such as Seep/W and Slide are appropriate for seepage analyses. Although some zones within the cross sections analyzed may be partially saturated, the Board recommends using conventional seepage analysis procedures, where the quantity of seepage and the pore pressures above the phreatic surface are assumed to be zero. The quantity of seepage above the phreatic surface is very small, and it is conservative to neglect the soil suction within this zone. In addition, analyzing only saturated flow avoids the complication involved in estimating initial suction conditions, soil-moisture characteristic curves, and the relationship between soil suction and hydraulic conductivity for partially saturated soils. Depending on the duration of the surcharge, the quality of the RCC upstream cut-off barrier might need to be upgraded to minimize additional embankment seepage which can develop further pore pressures in the downstream slope.

A thorough evaluation of the potential for this increase and the impact on the stability of the embankment is required at this stage.

  • Sliding. The Board agrees that limit equilibrium spreadsheet calculations will be appropriate for analysis of safety against sliding.
  • Toe erosion. The Board agrees that the potential for erosion caused by flow parallel to slopes can be approached using river erosion technology, and the methods for evaluating scour that have been developed recently by Briaud, 2008.
  • Side Slope Erosion. Permissible water velocities for flow to avoid erosion of soils of various grain size are available in the report of the ASCE Special Committee on Irrigation Research (1926), and in hydraulic engineering textbooks.
  • Protection Liftoff. Negative pressures from the overflowing water can be minimized by care during construction of the RCC to insure that the profile is smooth at joints between sections. Where the RCC overlay is stepped, the flow will be tumbling, with no significant negative pressures. Because the protection will experience only one flow episode, cavitation is unlikely to be a problem.
  • Excavation Dewatering. The Board agrees that well flow formulas will be appropriate for analysis of flows and pressures due to dewatering, and suggests that a dewatering contractor be engaged if significant dewateri ng is required.
  • Pressures on Buried Structures. For rigid buried structures such as reinforced concrete box culverts and vaults, the Board recommends the use of earth pressure distributions like those developed by the U. S. Army Corps of Engineers. For flexible buried conduits, the Board recommends the use of charts and formulas developed for design of flexible metal culvert structures (Duncan and Drawsky, 1983).

BOARD QUESTION 6: Proposed erosion control measures at the embankment toe of Keo wee Dam and along plant slopes exposed to flowing water.

Even though the RCC will reduce the velocity of the overtopping flow and dissipate some of the energy,

Mr. Curtis Arnold LIlll u; April 4, 2013 Page 8 the toe of the slope of Keowee Darn should be protected from erosion. Several options are available, such as a riprap blanket, continuing the RCC, or constructing a concrete plunge pool or stilling basin that would extend along the entire length of the embankment toe. The RCC stilling basin alternative was discussed in the Board's answer to Question 4. The riprap protection alternative should also be considered. Quarry or natural rock material for riprap appears to be readily available. Because of the height of the overtopping water and the height of the Keowee embankment, the velocities will be high and riprap rock size will be large. Depending on the overtopping discharge aii~d the thickness of the riprap, flow conditions will be interstitial and overflowing the riprap blanket. Neglecting friction, velocities at the toe of the dam would be approximately 75 ft/s. Actual velocities would be lower based upon estimated friction factor for the riprap. Design of the scour protection would be based on extrapolation of data from riprap tests conducted by the U. S. Anny Corps of Engineers (Maynord. 1988) in channels and included in the Corps _Engineering Manual No. !1110-2-1601(1994) and tests for the Bureau of Reclamation at Colorado State University (Mishra, 1998) for riprap on steeply sloping channels.

Riprap armoring would be placed along the toe immediately downstream of the piling cutoff wall. To be conservative, the riprap should be designed for the estimated velocity at the toe of the embankment and extend 300 to 400 feet downstream. The riprap should be placed to a minimu~m depth of 2 to 2.5 times D5 0 of the riprap for about 100 feet from the toe. The rock should be of relatively well graded sizes and the voids filled with a smaller dumped rock while the layers are placed. The riprap layer beyond 100 feet should have a minimum depth of 1.5 to 2.0 D5 0. The river channel downstream from Keowee Dam will scour during the overtopping event. The riprap layer at the toe of the dam is placed to stop and/or reduce the erosion at the toe and into the embankment. Riprap can also be placed at locations where embankment slopes intersect and where flowv might be parallel to the embankmaent slope.

J.M. Duncan Gonzalo Castro Gabriel FernandezJaeF.R James F. Ruff f

Mr. Curtis Arnold yjijk 1. 1 JLi; I u uu;I 2..

April 4, 2013 Page 9 REFERENCES Briaud, J.L. 2008. "Case Histories in Soil and Rock Erosion: Woodrow Wilson Bridge, Brazos River Meander, Normandy Cliffs, and Newv Orleans Levees", Journal of Geotechnical and Geoenvironmental Engineering, ASCE 134 (10): 1425-1447 Duncan J.M. and Drawsky R.H. 1983 "Design Procedures for Flexible Metal Culvert Structures",

Geotechnical Engineering Report No. UCB/GT/83-02, Univ. of California, Berkeley, CA, 50 pages, February 1983, Second Edition, May 1983)

Ehasz, J. L. and Bowles, D.S., 2013. Jocassee and Keowee Dams Breach Parameter Review, an independent review prepared for Duke Energy, February, 34 pp.

Froehlich, D. C., 1995. "Embankment damn breach parameters revisited". Water Resources Engineering, Proceedings of the 1995 ASCE Conference on Water Resources Engineering, San Antonio, Texas, August 14-18, 1995, p. 887-891.

Lagasse, P. F., Clopper, P. E., Zevenbergen, L. W., Ruff, J. F. , "Riprap Design Criteria, Recommended Specifications, and Quality Control," National Cooperative Highway Research Program Report 568, Transportation Research Board, Washington, D.C., (2006)

Maynord, S. T., Stable Riprap Size for Open Channel Flows," U.S. Army Corps of Engineers, Waterways Experiment Station, Hydraulics Laboratory, Technical Report HL-88-4, Vicksbury, MS (1988).

Mishra, S. K., "Riprap Design for Overtopped Embankments," Ph.D. Dissertation, Department of Civil Engineering, Colorado State University, 139 p. (1998).

U.S. Army CorPs pf Engineers, "Hydraulic Design of Flood Control Channels," Engineering Manual No. 1110-2-1601, U.S. Army Corps of Engineers, Waterways Experiment Station, Vicksbury, MS (1994).

Xu, Y.and Zhang, L. M, 2009. Breaching parameters for earth and rockfill dams, Journal of Geotechnical and Geoenvironmental Engineering, vol. 135, no. 12, p. 1957-1970.