environmental gis tues hoyle-dodson wadoe

Upload: christian-frias

Post on 07-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    1/41

    Integration of ArcGIS HydrologyIntegration of ArcGIS Hydrology

    Modeling and Geoprocessing ToolsModeling and Geoprocessing Tools

    With Dam Breach Flood AnalysisWith Dam Breach Flood Analysis

    Guy Hoyle-Dodson

    Washington State Department of EcologyDam Safety Office

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    2/41

    The Washington State Department of Ecology Dam Safety Office

    Is Tasked with Protecting Public Safety by Identifying the Downstream Risks to Life &Property

    and Requiring the Appropriate Dam Designs Based on that Hazard

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    3/41

    Downstream Breach Flood Profile AnalysisDownstream Breach Flood Profile Analysis

    IsIs

    Instrumental In Assessing The HazardInstrumental In Assessing The Hazard

    Downstream Hazard to Life & PropertyDownstream Hazard to Life & Property

    Hyperlink to portrait

    http://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysis
  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    4/41

    Dams Store Tremendous Potential EnergyDams Store Tremendous Potential Energy

    For Example: The GravitationalPotential Energyof the Cle Elum

    Reservoir at its nearestdownstream community, the townof Cle Elum, approaches

    120 Kilotons of TNT120 Kilotons of TNT

    During a Catastrophic Release

    of the reservoirs contents, thisenergy would likely be releasedover a 1 2 hour period as theflood wave travels downstream,severely eroding the channel andImpacting Downstream ResidencesImpacting Downstream Residences

    The quantification ofFloodWave Profile depths and velocitiesis the means by which the DamSafety Office predict risk and

    thereby Protect the PublicProtect the Public

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    5/41

    Engineering Analysis is Needed to Understand HowEngineering Analysis is Needed to Understand How

    Best to Protect the Public from Catastrophic DamBest to Protect the Public from Catastrophic Dam

    FailuresFailures

    ArcGIS is an Engineering Tool

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    6/41

    This Presentation Will Demonstrate How to:This Presentation Will Demonstrate How to:Add Orthophotos & DEM Rasters to a Project in the Correct Projection

    Create Breach Paths & Watersheds Using the Texas A&M Watershed and Stream DelineationTool

    Explain the Algorithms Involved in Calculating Reservoir Volume and Peak Breach Flow

    Explain the Algorithms Involved in Calculating Breach Flood Attenuation for Flow & Velocity

    Create Incremental Points with Elevations & Distances Along the Breach Path

    Identify Hazards Adjacent to the Breach Path Using Underlying Orthophotos and ElevationContours

    Create Points on the Breach Path Spatially Coincident to Hazard Points and Merge them withIncremental Points

    Create Table of Distance and Elevation for Both Regular Intervals and Hazard Points Along

    Breach Path and Enter Them into an Excel Breach Attenuation Calculator Worksheet

    Find Distance from Selected Points on Breach Path to Successive Elevation Boundaries

    Use the Attenuation Calculator to Determine the Breach Profile from (Top Width & Depth)for Selected Locations Along the Breach Path

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    7/41

    GIS Software and Geoprocessing Tools Allow a DetailedGIS Software and Geoprocessing Tools Allow a Detailed

    Analysis of Downstream Flood Inundation ImpactsAnalysis of Downstream Flood Inundation Impacts

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    8/41

    High Resolution (18 in) Orthophotos With SpatiallyHigh Resolution (18 in) Orthophotos With Spatially

    Accurate Overlays Are Essential in Evaluating HazardsAccurate Overlays Are Essential in Evaluating Hazards

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    9/41

    Orthophotos Are Rasters and the Proper Projection CanOrthophotos Are Rasters and the Proper Projection Can

    Be Obtained By Using ArcToolboxs Project RasterBe Obtained By Using ArcToolboxs Project Raster

    Open Data Management Tools : Projections and

    Transformations : Raster : Project Raster

    Import the Orthophoto and Check Input Coordinate System

    If none, Define Projection

    Check Coordinate System and use Cubic Resampling

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    10/41

    Digital Elevation Models (DEMs) Provide the ThreeDigital Elevation Models (DEMs) Provide the Three

    Dimensional Cartesian Coordinate System RequiredDimensional Cartesian Coordinate System Required

    for Detailed Spatial Analysisfor Detailed Spatial Analysis

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    11/41

    In Washington Many LiDAR DEMs Are AvailableIn Washington Many LiDAR DEMs Are Available

    Through the Puget Sound LiDAR Consortium (PSLC)Through the Puget Sound LiDAR Consortium (PSLC)

    LiDar DEMs are imported fromthe PSLC site as InterchangeFiles (e00), then converted inArcCatalog : ConversionTools : ArcView Import FromInterchange Files

    Raster DEMs often need to beclipped using Spatial Analyst:1. Create mask using drawing tool

    to set clip area, convert to shapefile and enter into SpatialAnalyst Options as AnalysisMask and Analysis Extent

    2. Enter DEM into SpatialAnalysis : Raster Calculatorand Evaluate

    3. Choose DATA: Make Permanent

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    12/41

    Hydrologic Modeling Is Used to Create aHydrologic Modeling Is Used to Create a

    Breach Path and a Watershed ExtentBreach Path and a Watershed Extent

    Useful Tool : Texas A&M Watershed and Stream DelineationUseful Tool : Texas A&M Watershed and Stream Delineation

    Texas A&M University

    Department of Civil Engineering

    Watershed and Streams Delineation

    ToolOlivera, Francisco. (2001). Extracting hydrologic information from spatial data for

    HMS modeling. Journal of Hydrologic Engineering, November/December

    2001.

    Detail of the main toolbar of Hydrology Modeling

    Hydrology Modeling is a set of tools created byESRI for the application of the hydrologicalfunctions in ArcGIS .

    These functions are automated by theWatershed and Streams Delineation Tool

    Outline of steps to derive surface characteristics from a DEM

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    13/41

    Step 1:Step 1:

    Create an Initial FlowCreate an Initial Flow

    Direction & Identify theDirection & Identify the

    Number of SinksNumber of Sinks

    A DEM free of sinks, a depressionless DEM,

    is required for Hydrologic Modeling

    Create 1stFlow Direction raster,

    determining the flow direction of every cell

    in the grid

    From Flow Direction count sinks To many

    sinks may render filling the sinks

    impractical due to computation limitations

    DEMs with Sinks in excess of 5,000 should

    be clipped

    This sets the stage for Filling the DEM

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    14/41

    Step 2:Step 2:

    Fill Sinks, CreatingFill Sinks, Creating

    New Filled DEMNew Filled DEM

    Input original LiDAR DEM and

    set fill limit as necessary

    Allow output Raster to be

    Temporary

    Once created, save by:Data : Make Permanent

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    15/41

    Step 3: Create Filled Flow Direction andStep 3: Create Filled Flow Direction and

    Flow Accumulation RastersFlow Accumulation Rasters

    For Flow Direction Use Filled DEM as Input

    Output as Temporary and save usingData : Make Permanent

    For Flow Accumulation use Filled Flow Direction

    Output as Temporary and save using

    Data : Make Permanent

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    16/41

    Step 4 : Create Flood PathStep 4 : Create Flood Path

    & Watershed Extent Using& Watershed Extent Using

    Raindrop andRaindrop and

    Watershed DelineationWatershed Delineation

    Enter Filled Flow Direction and Flow

    Accumulation

    Opens Watershed & Raindrop Buttons in

    Toolbar

    Choose Raindrop & Select Start Point

    Choose Watershed & Select Start Point

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    17/41

    Dam Safety Breach Hazard AnalysisDam Safety Breach Hazard Analysis

    Requires an Evaluation of Flood Attenuation as theRequires an Evaluation of Flood Attenuation as the

    Flood Progresses DownstreamFlood Progresses Downstream

    Initial Analysis Requires:

    Estimate of Max Reservoir Volume from Normal Pool Surface Area

    Dam Break Analysis: Calculating Breach Dimensions, Peak Flow, & Time to Peak

    Well Defined Breach Flood Hydrograph and Constant Rate Peak FlowDevelopment

    Stepwise Attenuation of Peak from Generalized Flood Attenuation Curves

    Breach Path Slope from Incremental Breach Flow Lengths and Point Elevations

    Incremental Breach Flood Wave Velocities from Slope & Channel Friction

    Flood Profile Top Width & Average Flood Depth from Channel Profile Side Slopes

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    18/41

    Reservoir VolumeReservoir Volume

    CalculationCalculationAssume Volume varies with stage as a

    power function, V = k y^m + C

    The equations relating depth, surface

    area and storage volume are:

    1. A = Ao + m k y^(m-1)

    2. V = Ao y + k y^m

    Such That:

    1. k = (A y - V) / [(m-1) y^m ]

    2. Ao = (V / y) [ m / (m-1)] - A

    { [ m / (m-1)] - 1 }

    (Walder and OConnor, October 1997)

    is Surface Area of Reservoir at Normal

    Pool and A0 is Bottom Surface Area

    Relates Max Pool Volume to Normal Pool

    Surface Area

    Dimensionless exponent m is often

    taken to be 2

    Automated Incremental Calculations

    (Increment: y) Gives Pertinent Estimated

    Values for the Reservoir

    Normal Pool

    Stage

    (ft)

    Surface Area(acres)

    CumulativeVolume

    (Acre-ft)

    1164.40 2.60 22.231

    Max Pool

    Stage

    (ft)

    Surface Area(acres)

    CumulativeVolume

    (Acre-ft)

    1168.40 3.21 33.846

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    19/41

    Initial Breach DevelopmentInitial Breach Development

    &&

    Peak Flow CalculationsPeak Flow Calculations

    Outlined in Washington State Dam SafetyGuidelines; Tech Note #1: Dam BreakInundation Analysis

    Dam Breach uses Breach FormationFactor (BFF), equating Volume of DamMaterial Eroded : VM with Volume of

    Reservoir and Dam Hydraulic Height:

    Erosion Resistant: VM = 3.75 (H) BFF

    Cohesionless: VM = 2.5 (H) BFF

    For a Trapezoidal Breach Configurationthe Bottom Width: Wb is related to theGeneral Height: H, Crest Width: C, SideSlopes: Z1, Z2, & Zb, and Volume Eroded:V

    Mby

    Wb = 27 VM - Hb2(CZb + HbZb(Z1+Z2)/3)

    Hb(C +( Hb(Z1+Z2)/2))

    *MacDonald & Langridge-Monopois and Froelich

    An Empirical Equation Relates PeakDischarge: Qwitha. Average Breach Width: W = Wb + ZbH;

    b. Elapsed Time: =0.42Vm0.36;

    c. Initial Head: Hw; and

    d. A = 23.4(Surface Area: SA)/W

    Q = 3.1WH1.5[A/(A+ (H1/2)]3

    *D.L. Fread

    Cw

    11

    Z1Z2

    Dam Cross Section

    Figure #1 Breach Dimensions

    Breach Cross Section

    HW

    Wb

    1

    Zb

    Dam

    Crest

    Hb

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    20/41

    Automated Calculations in Excel Produce a Step WiseAutomated Calculations in Excel Produce a Step Wise

    Breach Hydrograph With a Peak FlowBreach Hydrograph With a Peak Flow

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    21/41

    Breach Flow Can be Analyzed for Attenuation as the Flood WaveBreach Flow Can be Analyzed for Attenuation as the Flood Wave

    Propagates Downstream From the Breach UsingPropagates Downstream From the Breach Using

    Empirically Derived Generalized Attenuation CurvesEmpirically Derived Generalized Attenuation Curves

    0.0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1.0

    0 1 2 3 4 5 6 7 8 9 10 11 12

    Distance Downstream (miles)

    Ratio(Qx/Qp)

    10 Acre-Feet

    25 Acre-Feet

    50 Acre-Feet

    0.0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1.0

    0 1 2 3 4 5 6 7 8 9 10 11 12

    Distance Downstream (miles)

    Ratio(Qx/Qp)

    3000 Ac-Ft

    100 Ac-Ft

    200 Ac-Ft

    500 Ac-Ft

    1000 Ac-Ft

    These curves were developed using the HEC-HMS model to develop Breach Outflow Hydrographs

    and Channel Routings for multiple trials of Hypothetical Breach Floods at Varying Channel Distances

    and Reservoir Volumes

    The Routing was performed using the unsteady flow routine in the HEC-RAS model with hypothetical

    channels developed using geometric characteristics (width and slope) of actual stream channels.

    Qx values at incremental distances downstream were divided by the Max Flow to produce a Qx/Qp

    ratio as a measure of attenuation

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    22/41

    The Solution of These Generalized Curves for aThe Solution of These Generalized Curves for a

    Particular Breach Path and Max Peak Has BeenParticular Breach Path and Max Peak Has Been

    Automated in an Excel WorksheetAutomated in an Excel Worksheet.Input for

    Station

    Distance

    Calculated

    Downstream

    Distance

    Calculated

    River Mile

    Calculated

    Downstream

    Distance

    Input

    Elevation

    Calculate

    Channel

    Elevation

    Calculated

    Channel Gradient

    Measured

    Peak Flow

    Calculated

    Ratio

    Calculated

    Dam Break

    Flow

    (ft) (miles) (miles) (ft) (ft) (ft) (ft/ft) (ft/mile) (ft/sec) Qx/Qp Qx (cfs)

    Reservoir Edge At

    Dam:

    (Inundated by Pond)

    0.00 0.00 1.73 0.00 2179.05 2179 1008 Interpolated

    from Table

    1 Breach Path Point 25 223.78 0.04 1.73 223.78 2123.62 2123.62 0.25 1307.94 0.9961 1004.29

    2 Breach Path Point 50 451.22 0.09 1.64 451.22 2087.47 2087.47 0.16 839.13 0.9921 1000.26

    3 Near Hazard Point 67 604.67 0.11 1.62 604.67 2084.04 2084.04 0.02 117.86 0.9894 997.54

    4 Breach Path Point 75 677.74 0.13 1.60 677.74 2084.00 2084.00 0.00 3.19 0.9881 996.24

    5 Breach Path Point 100 904.27 0.17 1.56 904.27 2077.72 2077.72 0.03 146.46 0.9841 992.23

    6 Breach Path Point 125 1131.70 0.21 1.52 1131.70 2051.22 2051.22 0.12 615.20 0.9801 988.20

    7 Near Hazard Point 149 1349.09 0.26 1.47 1349.09 2028.01 2028.01 0.11 563.58 0.9759 983.98

    8 Breach Path Point 150 1358.23 0.26 1.47 1358.23 2025.65 2025.65 0.26 1365.88 0.9756 983.709 Breach Path Point 175 1586.58 0.30 1.43 1586.58 1992.73 1992.73 0.14 761.25 0.9688 976.76

    10 Breach Path Point 200 1813.10 0.34 1.39 1813.10 1975.23 1975.23 0.08 407.93 0.9619 969.87

    11 Near Hazard Point 216 1957.42 0.37 1.36 1957.42 1962.23 1962.23 0.09 475.56 0.9576 965.49

    12 Breach Path Point 225 2038.71 0.39 1.34 2038.71 1948.64 1948.64 0.17 882.43 0.9551 963.01

    13 Breach Path Point 250 2265.23 0.43 1.30 2265.23 1928.48 1928.48 0.09 469.89 0.9483 956.13

    14 Breach Path Point 275 2490.84 0.47 1.26 2490.84 1900.42 1900.42 0.12 656.76 0.9415 949.27

    15 Breach Path Point 300 2717.36 0.51 1.22 2717.36 1836.00 1836.00 0.28 1501.64 0.9349 942.61

    16 Breach Path Point 325 2943.89 0.56 1.17 2943.89 1778.61 1778.61 0.25 1337.53 0.9287 936.38

    17 Breach Path Point 725 6575.56 1.25 0.48 6575.56 1347.14 1347.14 #REF! #REF! 0.7991 805.73

    18 Near Hazard Point 739 6702.53 1.27 0.46 6702.53 1331.04 1331.04 0.13 669.62 0.7936 800.14

    19 Breach Path Point 750 6803.00 1.29 0.44 6803.00 1318.91 1318.91 0.12 637.66 0.7893 795.77

    20 Breach Path Point 775 7029.52 1.33 0.40 7029.52 1288.37 1288.37 0.13 711.77 0.7795 785.91

    21 Breach Path Point 800 7256.96 1.37 0.36 7256.96 1255.12 1255.12 0.15 771.90 0.7697 776.01

    22 Breach Path Point 825 7483.48 1.42 0.31 7483.48 1225.38 1225.38 0.13 693.32 0.7599 766.14

    23 Breach Path Point 8507710.01

    1.46 0.27 7710.011197.81

    1197.81 0.12 642.66 0.7501 756.28

    24 Breach Path Point 875 7936.53 1.50 0.23 7936.53 1168.21 1168.21 0.13 689.94 0.7404 746.56

    25 Near Hazard Point 879 7972.15 1.51 0.22 7972.15 1163.69 1163.69 0.13 668.92 0.7392 745.31

    26 Near Hazard Point 881 7990.42 1.51 0.22 7990.42 1163.00 1163.00 0.04 199.64 0.7386 744.66

    27 Breach Path Point 900 8163.97 1.55 0.18 8163.97 1135.27 1135.27 0.16 843.80 0.7325 738.57

    28 Breach Path Point 925 8389.58 1.59 0.14 8389.58 1125.68 1125.68 0.04 224.29 0.7247 730.64

    29 Near Hazard Point 932 8453.51 1.60 0.13 8453.51 1124.78 1124.78 0.01 74.20 0.7224 728.39

    30 Near Hazard Point 935 8480.00 1.61 0.12 8480.00 1123.11 1123.11 0.06 334.54 0.7215 727.46

    31 Breach Path Point 950 8617.01 1.63 0.10 8617.01 1114.18 1114.18 0.07 343.98 0.7167 722.65

    32 Near Hazard Point 955 8662.68 1.64 0.09 8662.68 1111.20 1111.20 0.07 344.81 0.7151 721.04

    33 Near Hazard Point 958 8690.08 1.65 0.08 8690.08 1109.51 1109.51 0.06 326.00 0.7142 720.08

    34 Breach Path Point 975 8844.45 1.68 0.05 8844.45 1103.10 1103.10 0.04 219.11 0.7088 714.66

    35 Breach Path Point 1000 9070.06 1.73 0.00 9134.00 1102.01 1102.01 0.00376 19.86 0.6987 704.48

    Order

    NumberStation Description

    Flood Segment Point

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    23/41

    Excel Worksheet Interpolates Attenuation Ratio from AttenuationExcel Worksheet Interpolates Attenuation Ratio from Attenuation

    Lookup Table and Calculates Flows and Velocities at IncrementalLookup Table and Calculates Flows and Velocities at Incremental

    DistancesDistancesPeak Breach Flow is AutomaticallyImported from the Dam BreakAnalysis Worksheet

    Incremental Breach Path Distanceand Point Elevation are Cut andPasted from Pathway Data FilesGenerated in

    In Excel, Bed Slope is calculatedand Channel Type is entered as anIndependent Variable and these areused to estimate Velocity fromempirically derived Tables

    The Solution Gives Attenuated DamBreach Flows and AverageVelocities at Incremental Distances

    Distance and Elevation Data Tablesare extracted using ArcGISGeoprocessing Tools

    Dam Breach Peak Discharge

    Description Parameter Input Equation Result

    Peak Discharge (cfs) from

    Dam Breach during

    Normal Pool*

    Qp(Normal) = QP = 3.1*Wavg*H1.5

    *[A/(A+(t*H1/2

    ))]3

    = 935.05

    Peak Discharge (cfs) from

    Dam Breach during

    Max Pool*

    Qp(Max) = QP = 3.1*Wavg*H1.5

    *[A/(A+(t*H1/2

    ))]3

    = 1136.51

    Inpu for

    Station

    Distance

    Input Water

    Surface

    Elevation

    AttenuationFlow

    Velocity

    Dam (ft) (ft) Qx (cfs) (ft/sec)

    Reservoir Edge At

    Dam:

    (Inundated by Pond)

    0.00 2179.05 1008.25

    1 Breach Path Point 25 223.78 2123.62 1004.29 12.00

    2 Breach Path Point 50 451.22 2087.47 1000.26 12.00

    3 Hazard 1 (67) 604.67 2084.04 997.54 6.57

    4 Breach Path Point 75 677.74 2084.00 996.24 1.10

    5 Breach Path Point 100 904.27 2077.72 992.23 7.32

    6 Breach Path Point 125 1131.70 2051.22 988.20 12.00

    7 Hazard 2 (149)1349.09 2028.01

    983.98 12.00

    Order

    Number

    Station

    DescriptionFlood Segment Point

    5 2.4 5 1.7 5 1.4

    10 3.4 10 2.4 10 1.9

    15 4.1 15 3.0 15 2.4

    20 4.8 20 3.5 20 2.7

    30 5.8 30 4.2 30 3.3

    40 6.7 40 4.9 40 3.8

    60 8.2 60 6.0 60 4.7

    80 9.5 80 6.9 80 5.4

    100 10.6 100 7.7 100 6.1

    200 12.0 200 10.9 200 8.6

    300 12.0 300 12.0 300 10.5

    400 12.0 400 12.0 400 12.0

    >400 12.0 >400 12.0 >400 12.0

    Velocity

    (ft/sec)

    Bedslope

    (ft/mi)

    Velocity

    (ft/sec)

    Velocity

    (ft/sec)

    Type 3Main Channel - Gravel,

    Coobles, & Bolders

    Overbanks - Wooded

    Type 1Main Channel - Gravel

    Overbanks - Grass, Pasture

    Bedslope

    (ft/mi)

    Bedslope

    (ft/mi)

    Type 2Main Channel - Gravel,

    Cobbles

    Overbanks - Irregular,

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    24/41

    Create Incremental Elevations and Distances forCreate Incremental Elevations and Distances for

    Breach Points Along Breach PathBreach Points Along Breach PathTo calculate the Attenuation of thePeak, Data Tables for Distances and

    Elevations at Specific Points alongthe Breach Path Are Needed forExport as dbf files

    Several Methods Are AvailableUsing ArcGIS Geoprocessing Tools,But ET GeoWizard 9.2 (freeware)Offers Simple Automated Tool:Station Points

    Tool Allows the Selection of a SetDistance Between Points to AddStation Points to 3D PolylineBreach Path 3D (Created using 3D-Analyst : Convert : Features to 3D)

    1. Save duplicate of Breach Path 3D usingData : Export Data

    2. Open ET GeoWizards 9.2 : Point : CreateStation Points Save output file asBreachpath3DPoints

    3. Enter value for Set distance betweenstations

    4. Field Calculator enter the flowing script:PerctDist = Et_Station/ Length ToCalculate the Percent Distance

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    25/41

    Identify Structures At Risk Along Breach Path by ComparingIdentify Structures At Risk Along Breach Path by Comparing

    Underlying Orthophotos to Contour Elevations,Underlying Orthophotos to Contour Elevations,

    Creating Centroidal Hazard PointsCreating Centroidal Hazard Points

    Create Contour Elevations using both SpatialAnalysts Surface Analyst : Contour Tool

    and the Clipped DEM

    Use Drawing Tool to circle those Structures

    that could be inundated by the Breach Flood

    (Identified by Contours to be within a 4 to 6

    foot elevation, orthogonal to Breach Path

    polyline)

    Use XTools : Feature Conversions :

    Convert Graphics to Shapes tool to convert

    first circle graphic to a shape file

    Use Editor : Copy & Move tools to copy

    and move this initial circle to other

    structures this will create a list of hazard

    features in a shape file

    Create a Properties At Risk Points shape

    file from this circle feature using Tool Boxs

    Data Management Tools : Features :

    Feature to Points

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    26/41

    The Attenuation Analysis Requires that We Identify Points on BreachThe Attenuation Analysis Requires that We Identify Points on Breach

    Path that Are Spatially Coincident to the Structures At Risk PointsPath that Are Spatially Coincident to the Structures At Risk Points

    Use Tool Boxs Analysis Tools : Proximity :

    Near Tool to find points on the Breach Paththat are nearest to the Properties At Risk

    Points

    Make copy of the Properties At Risk Points

    shape file using Export data and use

    Properties At Risk Points Dummy as the

    Input Features for the Near Tool

    Add the Breach Path Points3D shape file, as

    the Near feature - This will Choose Points on

    the Breach Path Adjacent to the Properties At

    Risk Points

    Check the Location and Angleboxes and

    set the Environments : General Setting :

    Output Coordinate System to the ProperProjection

    Open the Attribute Table and save the table

    as a data dbf file using the Export tool in the

    Options Menu. Save as Adjacent Points.dbf

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    27/41

    Create X, Y, Z Coordinated for Each PointCreate X, Y, Z Coordinated for Each Point

    Create a new shape file from the dbf table using theAdd XY Data tool in the Tools dropdown menu thiscreates a new Events feature.

    Use the NEAR_X field for the X coordinates and theNEAR_Y field for the Y coordinates

    Set the Input Coordinate System to the ProperProjection

    Convert Events Feature to a 3D feature (Point ZM)using the DEM and 3D Analysts "Convert : Featuresto3D", saving as a new 3D Feature Save as AdjacentPoints 3D

    Remove Original Events Feature

    Add the Z coordinate using XTools : TableOperations : Add X,Y,Z Coordinates. Be sure that theOnly for 3D shapes box is checked and specify theProper output projection. Save as Adjacent Points XYZ

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    28/41

    Delineate Distances for Points on the Breach PathDelineate Distances for Points on the Breach Path

    To add a Distance Along the Breach Path to each

    points, Join Adjacent Points XYZ to Breach

    Path Points 3D retaining only those record that

    match

    Select Join attribute from a table in Adjacent

    Points XYZ Choose the field Near_FID for the

    field that the join will be based on

    Choose Breach Path Points 3D as the shape file

    table that is to be joined

    Choose the FIDfield from the Breach Path

    Points3D shape file as the field that the join is to

    be based on

    Check the Advances : Keep only matching

    records box

    Select all Features in the Attribute Table and then

    open Data : Export Data Make sure that the

    Export is set to select features and save as a

    New feature: Adjacent Points XYZ & Distance

    Open Attribute Tables and Remove Unnecessary

    Fields.

    S l t E 25th (i t l f i t t d) P i t Al thS l t E 25th (i t l f i t t d) P i t Al th

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    29/41

    Select Every 25th (interval of interested) Point Along theSelect Every 25th (interval of interested) Point Along the

    Breach Path and Create a Selected Interval Breach Points ShapeBreach Path and Create a Selected Interval Breach Points Shape

    FileFileExport a copy of the Breach Path 3D Points file byselecting Data : ExportData. Save as a dummy file thatcan eventually be eliminated Breach Path 3D PointsDummy .

    Open Attributes table, open Options tab, right clickAdd Field and add a new field. - Name it ( i.e.Select25th) and select Type as Long Integer

    Open the Field Calculator for Select25th Enter thefollowing Pre-Logic Script Code:

    Dim a as Double

    IF ( [FID] Mod 25 ) = 0 Then

    a = [FID]

    End If

    Set Select25th = to a

    Select desired records interval Open Options tab andright click Select by Attribute In Calculation windowEnter

    Select25th >0 x

    Save using the Data : Export Data tool. Rename SelectedBreach Path Points

    Remove Dummy File

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    30/41

    Merge Adjacent Points 3D & Distance and Selected Breach PathMerge Adjacent Points 3D & Distance and Selected Breach Path

    Points to Create Distance and Elevation Table of Selected IntervalsPoints to Create Distance and Elevation Table of Selected Intervals

    Along Breach PathAlong Breach Path

    In ArcToolboxuse Data Management Tools :

    General : Merge Add both to Input Datasets

    Stipulate the output dataset:

    Every25th&AdjacentBreachPoints as the saved

    shape file

    This will merge important field such as ET_Order,

    ET_Z, and Distance. ET_Order can be used to sort

    all records from lowest to Highest Distance and

    Highest to lowest Elevation

    Open Attribute Table and Export as a dbf file.

    This can be open in Excel

    Used Distance & Elevation Fields for

    Input into Flood Attenuation Excel

    Spreadsheets Cut & Paste Distance

    and Elevation data into appropriate

    cells

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    31/41

    Output From Distance and Elevation AnalysisOutput From Distance and Elevation Analysis

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    32/41

    Distance and Elevation is Exported to the Excel Attenuation WorksheetDistance and Elevation is Exported to the Excel Attenuation Worksheet

    Input for

    Station

    Distance

    Calculated

    Downstream

    Distance

    Calculated

    River Mile

    Calculated

    Downstream

    Distance

    Input

    Elevation

    (ft) (miles) (miles) (ft) (ft)

    Reservoir Edge At

    Dam:

    (Inundated by Pond)

    0.00 0.00 1.73 0.00 2179.05

    1 Breach Path Point 25 223.78 0.04 1.73 223.78 2123.62

    2 Breach Path Point 50 451.22 0.09 1.64 451.22 2087.47

    3 Near Hazard Point 67 604.67 0.11 1.62 604.67 2084.04

    4 Breach Path Point 75 677.74 0.13 1.60 677.74 2084.00

    5 Breach Path Point 100 904.27 0.17 1.56 904.27 2077.72

    6 Breach Path Point 125 1131.70 0.21 1.52 1131.70 2051.22

    7 Near Hazard Point 149 1349.09 0.26 1.47 1349.09 2028.01

    8 Breach Path Point 150 1358.23 0.26 1.47 1358.23 2025.65

    9 Breach Path Point 175 1586.58 0.30 1.43 1586.58 1992.73

    10 Breach Path Point 200 1813.10 0.34 1.39 1813.10 1975.23

    11 Near Hazard Point 216 1957.42 0.37 1.36 1957.42 1962.23

    12 Breach Path Point 225 2038.71 0.39 1.34 2038.71 1948.64

    13 Breach Path Point 250 2265.23 0.43 1.30 2265.23 1928.48

    14 Breach Path Point 275 2490.84 0.47 1.26 2490.84 1900.42

    15 Breach Path Point 300 2717.36 0.51 1.22 2717.36 1836.0016 Breach Path Point 325 2943.89 0.56 1.17 2943.89 1778.61

    17 Breach Path Point 350 3169.50 0.60 1.13 3169.50 1730.39

    18 Breach Path Point 375 3396.93 0.64 1.09 3396.93 1680.47

    19 Breach Path Point 400 3623.46 0.69 1.04 3623.46 1645.82

    20 Breach Path Point 425 3849.98 0.73 1.00 3849.98 1622.42

    21 Breach Path Point 450 4077.42 0.77 0.96 4077.42 1592.17

    22 Breach Path Point 475 4304.85 0.82 0.91 4304.85 1567.49

    23 Breach Path Point 500 4532.29 0.86 0.87 4532.29 1545.85

    24 Breach Path Point 525 4758.81 0.90 0.83 4758.81 1525.00

    25 Breach Path Point 550 4986.25 0.94 0.79 4986.25 1509.39

    26 Breach Path Point 575 5212.77 0.99 0.74 5212.77 1492.14

    27 Breach Path Point 600 5438.38 1.03 0.70 5438.38 1471.54

    28 Breach Path Point 625 5666.73 1.07 0.66 5666.73 1448.50

    29 Breach Path Point 650 5893.25 1.12 0.61 5893.25 1424.11

    30 Breach Path Point 675 6120.69 1.16 0.57 6120.69 1394.60

    31 Breach Path Point 700 6348.13 1.20 0.53 6348.13 1373.22

    32 Breach Path Point 725 6575.56 1.25 0.48 6575.56 1347.1433 Near Hazard Point 739 6702.53 1.27 0.46 6702.53 1331.04

    34 Breach Path Point 750 6803.00 1.29 0.44 6803.00 1318.91

    35 Breach Path Point 775 7029.52 1.33 0.40 7029.52 1288.37

    36 Breach Path Point 800 7256.96 1.37 0.36 7256.96 1255.12

    37 Breach Path Point 825 7483.48 1.42 0.31 7483.48 1225.38

    38 Breach Path Point 850 7710.01 1.46 0.27 7710.01 1197.81

    39 Breach Path Point 875 7936.53 1.50 0.23 7936.53 1168.21

    40 Near Hazard Point 879 7972.15 1.51 0.22 7972.15 1163.69

    41 Near Hazard Point 881 7990.42 1.51 0.22 7990.42 1163.00

    42 Breach Path Point 900 8163.97 1.55 0.18 8163.97 1135.27

    43 Breach Path Point 925 8389.58 1.59 0.14 8389.58 1125.68

    44 Near Hazard Point 932 8453.51 1.60 0.13 8453.51 1124.78

    45 Near Hazard Point 935 8480.00 1.61 0.12 8480.00 1123.11

    46 Breach Path Point 950 8617.01 1.63 0.10 8617.01 1114.18

    47 Near Hazard Point 955 8662.68 1.64 0.09 8662.68 1111.20

    48 Near Hazard Point 958 8690.08 1.65 0.08 8690.08 1109.51

    49 Breach Path Point 975 8844.45 1.68 0.05 8844.45 1103.10

    50 Breach Path Point 1000 9070.06 1.73 0.00 9134.00 1102.01

    Order

    Number

    Station

    DescriptionFlood Segment Point

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    33/41

    Estimation of Breach Path Profile Top Widths & DepthsEstimation of Breach Path Profile Top Widths & Depths

    Has Also Been Automated in an Excel WorksheetHas Also Been Automated in an Excel Worksheet

    Calculated

    Downstream

    Distance

    Calculate

    Channel

    Elevation

    Average

    Inverse Slope

    of Channel

    Walls

    Average

    Inverse Slope

    of Reach Wall

    Cross

    Sectional

    Area in

    Flood

    Depth of

    Flood

    Water

    Surface

    Elevation

    0Reservoir

    At

    Left Interval

    (ft)

    Right Interval

    (ft)

    Left (ft) Right (ft) (miles) (ft)Z(Left)(ft/ft)

    Z (Right)(ft/ft)

    Z(Inverse)(ft/ft)

    Z(Average)(ft/ft)

    (ft2) (ft) (ft) Left (ft) Right (ft)

    1 Breach Path Point 25 0.10 7.31 400.00 400.53 0.04 2123.62 0.0003 0.0183 108.0905 108.0905 83.69 0.20 2123.82 812.70 11.13

    2 Breach Path Point 50 8.11 3.07 100.14 121.51 0.09 2087.47 0 .0809 0.0252 18.8385 63.4645 83.35 1.79 2089.26 22.12 70.97

    3 Hazard 1 (67) 0.10 31.37 404.34 517.86 0.11 2084.04 0.0002 0.0606 32.8814 25.8599 151.86 0.27 2084.32 1105.91 4.52

    4 Breach Path Point 75 0.50 6.54 100.00 100.97 0.13 2084.00 0 .0050 0.0647 28.6703 30.7758 907.27 2.91 2086.91 578.41 44.97

    5 Breach Path Point 100 5.83 2.75 102.70 100.00 0.17 2077.72 0.0567 0.0275 23.7383 26.2043 135.63 2.24 2079.96 39.50 81.50

    6 Breach Path Point 125 12.57 5.07 102.70 100.00 0.21 2051.22 0 .1224 0.0507 11.5486 17.6435 82.35 2.43 2053.65 19.85 47.90

    7 Hazard 2 (149) 2.82 18.11 100.00 100.00 0.26 2028.01 0.0282 0.1811 9.5553 10.5520 82.00 2.00 2030.01 70.97 11.04

    8 Breach Path Point 150 3.53 19.37 100.00 100.00 0.26 2025.65 0.0353 0.1937 8.7349 9.1451 81.97 2.21 2027.86 62.72 11.42

    9 Breach Path Point 175 2.48 9.76 100.99 100.00 0.30 1992.73 0 .0245 0.0976 16.3730 12.5540 81.40 1.79 1994.51 72.85 18.29

    10 Breach Path Point 200 0.36 9.64 420.73 400.00 0.34 1975.23 0.0009 0.0241 80.1499 48.2615 80.82 0.37 1975.59 425.64 15.22

    11 Hazard 3 (216) 1.32 2.59 200.00 201.51 0.37 1962.23 0 .0066 0.0128 102.9300 91.5400 80.46 0.84 1963.06 127.13 65.1412 Breach Path Point 225 4.88 16.18 412.15 411.41 0.39 1948.64 0.0118 0.0393 39.1045 71.0172 80.25 1.21 1949.85 102.13 30.73

    13 Breach Path Point 250 22.40 2.21 425.29 399.15 0.43 1928.48 0.0527 0.0055 34.3603 36.7324 79.68 0.89 1929.38 16.94 161.57

    14 Breach Path Point 275 3.37 3.28 100.00 100.00 0.47 1900.42 0 .0337 0.0328 30.0996 32.2300 79.11 1.62 1902.04 48.11 49.49

    15 Breach Path Point 300 10.78 16.05 101.02 102.70 0.51 1836.00 0.1067 0.1563 7.6041 18.8519 78.55 3.16 1839.15 29.57 20.20

    16 Breach Path Point 325 35.06 35.92 100.00 100.00 0.56 1778.61 0.3506 0.3592 2.8179 5.2110 78.03 5.26 1783.88 15.01 14.65

    17 Breach Path Point 350 62.87 34.93 102.65 100.00 0.60 1730.39 0.6125 0.3493 2.0796 2.4488 77.51 5.87 1736.26 9.59 16.8118 Breach Path Point 375 78.53 33.76 100.14 105.12 0.64 1680.47 0.7842 0.3211 1.8094 1.9445 76.99 5.92 1686.40 7.55 18.44

    19 Breach Path Point 400 60.77 36.41 100.00 100.00 0.69 1645.82 0.6077 0.3641 2.0579 1.9337 76.47 5.90 1651.72 9.71 16.21

    20 Breach Path Point 425 41.20 37.96 100.00 100.00 0.73 1622.42 0.4120 0.3796 2.5267 2.2923 75.96 5.48 1627.90 13.30 14.43

    21 Breach Path Point 450 46.60 11.05 100.00 100.12 0.77 1592.17 0.4660 0.1104 3.4699 2.9983 75.38 3.67 1595.84 7.87 33.23

    22 Breach Path Point 475 42.29 22.10 100.00 100.00 0.82 1567.49 0.4229 0.2210 3.1058 3.2879 74.76 4.66 1572.15 11.01 21.08

    23 Breach Path Point 500 32.01 13.19 99.14 108.24 0.86 1545.85 0.3229 0.1218 4.4970 3.8014 74.14 3.62 1549.47 11.22 29.73

    24 Breach Path Point 525 28.11 25.79 100.00 105.09 0.90 1525.00 0.2811 0.2454 3.7984 4.1477 73.52 4.39 1529.39 15.62 17.88

    25 Breach Path Point 550 18.62 33.15 101.02 100.00 0.94 1509.39 0.1843 0.3315 3.8773 3.8378 76.30 4.25 1513.64 23.07 12.83

    26 Breach Path Point 575 13.11 16.72 100.00 101.02 0.99 1492.14 0.1311 0.1655 6.7423 5.3098 72.28 3.25 1495.39 24.80 19.65

    27 Breach Path Point 600 21.54 18.47 100.00 100.99 1.03 1471.54 0.2154 0.1829 5.0209 5.8816 71.49 3.76 1475.30 17.46 20.56

    28 Breach Path Point 625 42.03 25.94 108.24 99.14 1.07 1448.50 0.3883 0.2617 3.0769 4.0489 70.61 4.70 1453.20 12.10 17.96

    29 Breach Path Point 650 38.07 46.22 100.00 100.00 1.12 1424.11 0.3807 0.4622 2.3728 2.7248 69.75 5.40 1429.51 14.17 11.68

    30 Breach Path Point 675 54.72 35.58 100.00 100.00 1.16 1394.60 0.5472 0.3558 2.2149 2.2939 68.88 5.45 1400.05 9.96 15.3231 Breach Path Point 700 42.31 58.59 105.09 100.00 1.20 1373.22 0.4026 0.5859 2.0232 2.1191 68.01 5.70 1378.92 14.15 9.72

    32 Breach Path Point 725 51.10 43.23 99.14 108.24 1.25 1347.14 0.5154 0.3994 2.1862 2.1047 67.14 5.50 1352.64 10.67 13.76

    33 Hazard 4 (739) 47.31 49.09 108.24 99.14 1.27 1331.04 0.4371 0.4951 2.1453 2.1658 66.68 5.56 1336.61 12.73 11.24

    34 Breach Path Point 750 47.19 41.66 100.00 100.00 1.29 1318.91 0.4719 0.4166 2.2510 2.1981 66.31 5.42 1324.32 11.48 13.00

    35 Breach Path Point 775 28.05 24.96 100.00 100.00 1.33 1288.37 0.2805 0.2496 3.7724 3.0117 65.49 4.16 1292.53 14.83 16.66

    36 Breach Path Point 800 32.91 17.81 100.00 100.00 1.37 1255.12 0.3291 0.1781 3.9433 3.8579 64.67 3.87 1258.99 11.75 21.71

    37 Breach Path Point 825 0.34 20.87 100.00 100.00 1.42 1225.38 0.0034 0.2087 9.4259 6.6846 63.85 0.66 1226.03 191.16 3.1538 Breach Path Point 850 7.43 10.91 100.00 100.00 1.46 1197.81 0 .0743 0.1091 10.9051 10.1655 63.02 2.36 1200.17 31.77 21.64

    39 Breach Path Point 875 11.59 3.19 105.12 100.14 1.50 1168.21 0 .1102 0.0318 14.0795 12.4923 62.21 1.75 1169.96 15.90 55.08

    40 Hazard 5 (879) 10.79 7.70 99.14 108.24 1.51 1163.69 0 .1088 0.0711 11.1140 12.5967 62.11 2.31 1166.00 21.24 32.49

    41 Hazard 6 (881) 9.36 8.39 100.00 102.65 1.51 1163.00 0 .0936 0.0817 11.4042 11.2591 87.30 2.76 1165.76 29.48 33.77

    42 Breach Path Point 900 25.82 12.67 108.24 99.14 1.55 1135.27 0.2386 0.1278 5.4583 8.4313 61.55 3.20 1138.47 13.42 25.0443 Breach Path Point 925 0.60 6.46 108.24 98.48 1.59 1125.68 0.0056 0.0656 28.1138 16.7861 80.85 0.91 1126.59 163.84 13.87

    44 Hazard 7 (932) 1.40 5.48 200.90 200.00 1.60 1124.78 0 .0070 0.0274 58.2226 43.1682 139.47 1.25 1126.03 178.57 45.48

    45 Hazard 8 (935) 2.32 4.55 200.00 200.00 1.61 1123.11 0 .0116 0.0227 58.2785 58.2505 66.03 1.01 1124.11 86.86 44.30

    46 Breach Path Point 950 0.45 2.48 200.00 200.00 1.63 1114.18 0 .0023 0.0124 136.5657 97.4221 64.69 0.50 1114.68 220.45 40.08

    47 Hazard 9 & 10 (955) 5.99 2.21 400.00 402.77 1.64 1111.20 0 .0150 0.0055 97.8045 117.1851 64.47 0.72 1111.92 48.06 131.21

    48 Hazard 11 (958) 4.52 3.90 400.00 406.87 1.65 1109.51 0 .0113 0.0096 95.8118 96.8082 66.20 0.83 1110.33 73.38 86.44

    49 Breach Path Point 975 0.00 5.45 449.40 406.01 1.68 1103.10 0.0000 0.0134 148.7879 122.2999 80.01 0.03 1103.13 4630.22 2.57

    50 Breach Path Point 1000 1.09 0.10 416.92 400.00 1.73 1102.01 0.0026 0.0002 696.6848 422.7364 260.61 0.34 1102.36 131.60 1379.60

    Input

    Distance to Contour Lines

    from

    Center of Channel

    Order

    NumberChannel Input

    Contour Line Elevation Interval

    Station DescriptionCross Section

    Slope of Channel

    WallsInundation Flood Plain

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    34/41

    Automated Spreadsheet Requires the Input of SequentialAutomated Spreadsheet Requires the Input of Sequential

    Channel Contour Elevation Intervals and Distance IntervalsChannel Contour Elevation Intervals and Distance Intervals

    Channel profile Elevation and Distance Intervals can

    be extracted using ArcGIS Geoprocessing tools and

    cut and pasted into spreadsheet cells for Automatic

    Calculation

    This requires the creation ofBuffer Zones around the

    Breach Path and the delineation ofLeft and Right

    Bank Lines

    The Goal is to create dbf tables ofChannel Profiles

    from which Slopes can be calculated at specific

    stations along the Breach path

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    35/41

    Delineate a Left and Right Bank Polygons fromDelineate a Left and Right Bank Polygons from

    Buffer Zones of Varying WidthsBuffer Zones of Varying Widths

    In ArcToolBox, use the Analyst Tools : Proximity :Buffer tool to create a buffer around the Breach

    path

    Enter Input Feature : Breach Path & Output

    Feature Class : BreachPathXXX???Buffer

    Its best to use a well-defined nomenclature to

    keep track of files, where

    xxx= Distance

    ??? = Left of Right

    Enter Linear unit as distance from Breach Path

    to Outer Boundary of the Buffer

    Create Buffer Boundary Line usingXTools : Feature Conversions : Convert Polygons

    to Polylines or ArcToolbox : Data Management

    Tool : Features : Polygon To Line - Name

    feature: i.e. BreachPathXXXBuffer???Polyline

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    36/41

    Find Distance from the Breach Path to theFind Distance from the Breach Path to the

    Left and Right Outer Boundary LinesLeft and Right Outer Boundary Lines

    Use Editor : Spit Tool to split the Inner Boundary

    of the Polyline from the Outer Boundary, Creatingan single Outer Polyline

    1. Left Click Editor and choose Start Editing Polyline

    2. Use Edit Tool to select the Polyline feature - reveal

    vertices

    3. Use split tool to clip a vertex on the Bottom and Top of

    Polygon outline

    4. Delete the Inner Boundary, leaving only the OuterBoundary Polyline

    5. Save and close Editor

    Convert Polyline to 3D using 3D Analyst : Convert

    : Features to 3D

    Use this Polyline as the Outer Boundary of buffer

    around the Breach Path

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    37/41

    Find Distance from Selected Points on Breach Path to theFind Distance from Selected Points on Breach Path to the

    Nearest Point of the Right and Left Outer Boundary LinesNearest Point of the Right and Left Outer Boundary Lines

    Use ToolBoxs Analysis Tools : Proximity : Near Tool tofind points and distances for selected Points on the BreachPath to the nearest segment of the Left or Right Polylinesforming the outer boundaries of the buffer.

    1. Use dummy Every25th&NearHazardBreachPoints as the InputFeature

    2. Use The Right or Left Polyline as the Near Feature

    3. Check Location and Angle boxes

    4. Open point file Attribute table and save as dbf file in Options :Export as OuterXXXBuffer???AdjacentPoints

    5. This will give you Distances and the x & Y coordinates for pointsadjacent to selected points on the Breach Path

    Use Tools : Add XY Data as outlined before to Create aPoints Event file of the Boundary Polyline

    1. Open Tools : Add XY Data and choose the OuterXXXBuffer???AdjacentPoints dbf table

    2. Use the NEAR_X field for the X coordinates and the NEAR_Y fieldfor the Y coordinates

    3. Convert Event file to 3D Feature Using 3D-Analyst and save asOuterXXXBuffer???AdjacentPoints3D

    Find Z-Value elevation for all points on the BufferPolyline using XTools : Table Operations : Add X,Y,ZCoordinates

    Repeat for other boundary widths adjacent

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    38/41

    Cut and Paste Data into Breach Attenuation Calculation Excel SpreadsheetsCut and Paste Data into Breach Attenuation Calculation Excel Spreadsheets

    This will require sorting to put the data from thepoints on the Breach Path into ascending Distanceand descending Elevation

    Multiple Boundaries may be necessary to accountfor Channel Profile variations

    For each Hazard Point along the Breach Path aChange in Elevation for a Known Distances to theContour Boundary can be exported to and ExcelFile then Cut & Pasted into the AttenuationWorksheet

    From this Data, in conjunction with previouslycalculated Peak Breach Flow Volume the followingcan be calculated at selected points, :

    1. The Cross Sectional Flood Area for every selected pointalong the Breach Path

    2. The Average Depth Of Flood for every selected point alongthe Breach Path

    3. The Water Surface Elevation of the flood at every selected

    point along the Breach Path

    4. The Flood Top Width at every selected point along theBreach Path

    From previous Calculation We also have

    5. Attenuation Of Peak Flow for every selected point alongthe Breach Path

    6. Velocity Of The Peak Flow at every selected point alongthe Breach Path

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    39/41

    Depth and Velocity Data At Each Hazard Point is Used inDepth and Velocity Data At Each Hazard Point is Used in

    A Hazard Assessment AnalysisA Hazard Assessment Analysis

    Attenuation determines The Breach FloodProfile downstream of the breach

    Top Widths and Water Surface Elevationallow us to determine if the structures arelikely to be Inundated

    Average Depth and Velocity allow us toPrioritize the Hazard to persons andproperty

    Hazard Assessment Curve For Flood Danger To Adults

    from Flood Velocity And Flood Depth Developed by

    The United State Bureau of Reclamation (USBR)

    Left (ft) Right (ft) Left (ft) Right (ft)

    Reservoir Edge At Dam:

    (Inundated by Pond)

    Breach Path Point 25

    Breach Path Point 50

    Near Hazard Point 67 109.00 Sheds

    Breach Path Point 75

    Breach Path Point 125Near Hazard Point 149 72.00 Clubhouse

    Breach Path Point 150

    Breach Path Point 200

    Near Hazard Point 216 77.00 Utility Building

    Breach Path Point 225

    Breach Path Point 725

    Near Hazard Point 739 18.00 Unknown

    Breach Path Point 750

    Breach Path Point 875

    Near Hazard Point 879 102.00 Residence 5

    Near Hazard Point 881 140.00 Residence 6

    Breach Path Point 900Breach Path Point 925

    Near Hazard Point 932 11.00 Shed/Residence 7

    Near Hazard Point 935 51.00 Residence 8

    Breach Path Point 950

    Near Hazard Point 955 42.00 Residence 10

    Near Hazard Point 958 86.00 Residence 11

    Station Description

    Flood Segment Point

    Hazard Location of Structures(Distance from Breach Path)

    Type of Structure

    AtRisk

    Judgment ZoneLow Hazard

    Zone

    High HazardZone

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    40/41

    With These Techniques We CanWith These Techniques We Can

    Efficiently and EffectivelyEfficiently and Effectively

    Determine Dam Breach Flood Impacts on The PublicDetermine Dam Breach Flood Impacts on The Public

    This Analysis Allows Us to:

    Select Design & Performance Goals for Critical Project Elements

    Assign a Preliminary Design Step

    Select Proper Design Storm Criteria for that Design Step

    Evaluate the Adequacy of Current Embankment Designs

    Prepare Emergency Action Plans

  • 8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE

    41/41

    . . . The importance of the universal machine is clear. We do

    not need to have an infinity of different machines doing

    different jobs. A single one will suffice. The engineering

    problem of producing various machines for various jobs is

    replaced by the office work of "programming" the universal

    machine to do these jobs. (Alan Turing 1948)

    ArcGIS: A Universal Turing Machine?ArcGIS: A Universal Turing Machine?