environmental gis tues hoyle-dodson wadoe
TRANSCRIPT
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
1/41
Integration of ArcGIS HydrologyIntegration of ArcGIS Hydrology
Modeling and Geoprocessing ToolsModeling and Geoprocessing Tools
With Dam Breach Flood AnalysisWith Dam Breach Flood Analysis
Guy Hoyle-Dodson
Washington State Department of EcologyDam Safety Office
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
2/41
The Washington State Department of Ecology Dam Safety Office
Is Tasked with Protecting Public Safety by Identifying the Downstream Risks to Life &Property
and Requiring the Appropriate Dam Designs Based on that Hazard
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
3/41
Downstream Breach Flood Profile AnalysisDownstream Breach Flood Profile Analysis
IsIs
Instrumental In Assessing The HazardInstrumental In Assessing The Hazard
Downstream Hazard to Life & PropertyDownstream Hazard to Life & Property
Hyperlink to portrait
http://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysishttp://c/Documents%20and%20Settings/cdaniel/Local%20Settings/Temp/Portrait%20Slide1%20-%20Breach%20Overview.pptx#Integration%20of%20ArcGIS%20Hydrology%20Modeling%20and%20Geoprocessing%20Tools%20With%20Dam%20Breach%20Flood%20Analysis -
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
4/41
Dams Store Tremendous Potential EnergyDams Store Tremendous Potential Energy
For Example: The GravitationalPotential Energyof the Cle Elum
Reservoir at its nearestdownstream community, the townof Cle Elum, approaches
120 Kilotons of TNT120 Kilotons of TNT
During a Catastrophic Release
of the reservoirs contents, thisenergy would likely be releasedover a 1 2 hour period as theflood wave travels downstream,severely eroding the channel andImpacting Downstream ResidencesImpacting Downstream Residences
The quantification ofFloodWave Profile depths and velocitiesis the means by which the DamSafety Office predict risk and
thereby Protect the PublicProtect the Public
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
5/41
Engineering Analysis is Needed to Understand HowEngineering Analysis is Needed to Understand How
Best to Protect the Public from Catastrophic DamBest to Protect the Public from Catastrophic Dam
FailuresFailures
ArcGIS is an Engineering Tool
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
6/41
This Presentation Will Demonstrate How to:This Presentation Will Demonstrate How to:Add Orthophotos & DEM Rasters to a Project in the Correct Projection
Create Breach Paths & Watersheds Using the Texas A&M Watershed and Stream DelineationTool
Explain the Algorithms Involved in Calculating Reservoir Volume and Peak Breach Flow
Explain the Algorithms Involved in Calculating Breach Flood Attenuation for Flow & Velocity
Create Incremental Points with Elevations & Distances Along the Breach Path
Identify Hazards Adjacent to the Breach Path Using Underlying Orthophotos and ElevationContours
Create Points on the Breach Path Spatially Coincident to Hazard Points and Merge them withIncremental Points
Create Table of Distance and Elevation for Both Regular Intervals and Hazard Points Along
Breach Path and Enter Them into an Excel Breach Attenuation Calculator Worksheet
Find Distance from Selected Points on Breach Path to Successive Elevation Boundaries
Use the Attenuation Calculator to Determine the Breach Profile from (Top Width & Depth)for Selected Locations Along the Breach Path
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
7/41
GIS Software and Geoprocessing Tools Allow a DetailedGIS Software and Geoprocessing Tools Allow a Detailed
Analysis of Downstream Flood Inundation ImpactsAnalysis of Downstream Flood Inundation Impacts
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
8/41
High Resolution (18 in) Orthophotos With SpatiallyHigh Resolution (18 in) Orthophotos With Spatially
Accurate Overlays Are Essential in Evaluating HazardsAccurate Overlays Are Essential in Evaluating Hazards
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
9/41
Orthophotos Are Rasters and the Proper Projection CanOrthophotos Are Rasters and the Proper Projection Can
Be Obtained By Using ArcToolboxs Project RasterBe Obtained By Using ArcToolboxs Project Raster
Open Data Management Tools : Projections and
Transformations : Raster : Project Raster
Import the Orthophoto and Check Input Coordinate System
If none, Define Projection
Check Coordinate System and use Cubic Resampling
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
10/41
Digital Elevation Models (DEMs) Provide the ThreeDigital Elevation Models (DEMs) Provide the Three
Dimensional Cartesian Coordinate System RequiredDimensional Cartesian Coordinate System Required
for Detailed Spatial Analysisfor Detailed Spatial Analysis
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
11/41
In Washington Many LiDAR DEMs Are AvailableIn Washington Many LiDAR DEMs Are Available
Through the Puget Sound LiDAR Consortium (PSLC)Through the Puget Sound LiDAR Consortium (PSLC)
LiDar DEMs are imported fromthe PSLC site as InterchangeFiles (e00), then converted inArcCatalog : ConversionTools : ArcView Import FromInterchange Files
Raster DEMs often need to beclipped using Spatial Analyst:1. Create mask using drawing tool
to set clip area, convert to shapefile and enter into SpatialAnalyst Options as AnalysisMask and Analysis Extent
2. Enter DEM into SpatialAnalysis : Raster Calculatorand Evaluate
3. Choose DATA: Make Permanent
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
12/41
Hydrologic Modeling Is Used to Create aHydrologic Modeling Is Used to Create a
Breach Path and a Watershed ExtentBreach Path and a Watershed Extent
Useful Tool : Texas A&M Watershed and Stream DelineationUseful Tool : Texas A&M Watershed and Stream Delineation
Texas A&M University
Department of Civil Engineering
Watershed and Streams Delineation
ToolOlivera, Francisco. (2001). Extracting hydrologic information from spatial data for
HMS modeling. Journal of Hydrologic Engineering, November/December
2001.
Detail of the main toolbar of Hydrology Modeling
Hydrology Modeling is a set of tools created byESRI for the application of the hydrologicalfunctions in ArcGIS .
These functions are automated by theWatershed and Streams Delineation Tool
Outline of steps to derive surface characteristics from a DEM
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
13/41
Step 1:Step 1:
Create an Initial FlowCreate an Initial Flow
Direction & Identify theDirection & Identify the
Number of SinksNumber of Sinks
A DEM free of sinks, a depressionless DEM,
is required for Hydrologic Modeling
Create 1stFlow Direction raster,
determining the flow direction of every cell
in the grid
From Flow Direction count sinks To many
sinks may render filling the sinks
impractical due to computation limitations
DEMs with Sinks in excess of 5,000 should
be clipped
This sets the stage for Filling the DEM
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
14/41
Step 2:Step 2:
Fill Sinks, CreatingFill Sinks, Creating
New Filled DEMNew Filled DEM
Input original LiDAR DEM and
set fill limit as necessary
Allow output Raster to be
Temporary
Once created, save by:Data : Make Permanent
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
15/41
Step 3: Create Filled Flow Direction andStep 3: Create Filled Flow Direction and
Flow Accumulation RastersFlow Accumulation Rasters
For Flow Direction Use Filled DEM as Input
Output as Temporary and save usingData : Make Permanent
For Flow Accumulation use Filled Flow Direction
Output as Temporary and save using
Data : Make Permanent
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
16/41
Step 4 : Create Flood PathStep 4 : Create Flood Path
& Watershed Extent Using& Watershed Extent Using
Raindrop andRaindrop and
Watershed DelineationWatershed Delineation
Enter Filled Flow Direction and Flow
Accumulation
Opens Watershed & Raindrop Buttons in
Toolbar
Choose Raindrop & Select Start Point
Choose Watershed & Select Start Point
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
17/41
Dam Safety Breach Hazard AnalysisDam Safety Breach Hazard Analysis
Requires an Evaluation of Flood Attenuation as theRequires an Evaluation of Flood Attenuation as the
Flood Progresses DownstreamFlood Progresses Downstream
Initial Analysis Requires:
Estimate of Max Reservoir Volume from Normal Pool Surface Area
Dam Break Analysis: Calculating Breach Dimensions, Peak Flow, & Time to Peak
Well Defined Breach Flood Hydrograph and Constant Rate Peak FlowDevelopment
Stepwise Attenuation of Peak from Generalized Flood Attenuation Curves
Breach Path Slope from Incremental Breach Flow Lengths and Point Elevations
Incremental Breach Flood Wave Velocities from Slope & Channel Friction
Flood Profile Top Width & Average Flood Depth from Channel Profile Side Slopes
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
18/41
Reservoir VolumeReservoir Volume
CalculationCalculationAssume Volume varies with stage as a
power function, V = k y^m + C
The equations relating depth, surface
area and storage volume are:
1. A = Ao + m k y^(m-1)
2. V = Ao y + k y^m
Such That:
1. k = (A y - V) / [(m-1) y^m ]
2. Ao = (V / y) [ m / (m-1)] - A
{ [ m / (m-1)] - 1 }
(Walder and OConnor, October 1997)
is Surface Area of Reservoir at Normal
Pool and A0 is Bottom Surface Area
Relates Max Pool Volume to Normal Pool
Surface Area
Dimensionless exponent m is often
taken to be 2
Automated Incremental Calculations
(Increment: y) Gives Pertinent Estimated
Values for the Reservoir
Normal Pool
Stage
(ft)
Surface Area(acres)
CumulativeVolume
(Acre-ft)
1164.40 2.60 22.231
Max Pool
Stage
(ft)
Surface Area(acres)
CumulativeVolume
(Acre-ft)
1168.40 3.21 33.846
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
19/41
Initial Breach DevelopmentInitial Breach Development
&&
Peak Flow CalculationsPeak Flow Calculations
Outlined in Washington State Dam SafetyGuidelines; Tech Note #1: Dam BreakInundation Analysis
Dam Breach uses Breach FormationFactor (BFF), equating Volume of DamMaterial Eroded : VM with Volume of
Reservoir and Dam Hydraulic Height:
Erosion Resistant: VM = 3.75 (H) BFF
Cohesionless: VM = 2.5 (H) BFF
For a Trapezoidal Breach Configurationthe Bottom Width: Wb is related to theGeneral Height: H, Crest Width: C, SideSlopes: Z1, Z2, & Zb, and Volume Eroded:V
Mby
Wb = 27 VM - Hb2(CZb + HbZb(Z1+Z2)/3)
Hb(C +( Hb(Z1+Z2)/2))
*MacDonald & Langridge-Monopois and Froelich
An Empirical Equation Relates PeakDischarge: Qwitha. Average Breach Width: W = Wb + ZbH;
b. Elapsed Time: =0.42Vm0.36;
c. Initial Head: Hw; and
d. A = 23.4(Surface Area: SA)/W
Q = 3.1WH1.5[A/(A+ (H1/2)]3
*D.L. Fread
Cw
11
Z1Z2
Dam Cross Section
Figure #1 Breach Dimensions
Breach Cross Section
HW
Wb
1
Zb
Dam
Crest
Hb
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
20/41
Automated Calculations in Excel Produce a Step WiseAutomated Calculations in Excel Produce a Step Wise
Breach Hydrograph With a Peak FlowBreach Hydrograph With a Peak Flow
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
21/41
Breach Flow Can be Analyzed for Attenuation as the Flood WaveBreach Flow Can be Analyzed for Attenuation as the Flood Wave
Propagates Downstream From the Breach UsingPropagates Downstream From the Breach Using
Empirically Derived Generalized Attenuation CurvesEmpirically Derived Generalized Attenuation Curves
0.0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
0 1 2 3 4 5 6 7 8 9 10 11 12
Distance Downstream (miles)
Ratio(Qx/Qp)
10 Acre-Feet
25 Acre-Feet
50 Acre-Feet
0.0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
0 1 2 3 4 5 6 7 8 9 10 11 12
Distance Downstream (miles)
Ratio(Qx/Qp)
3000 Ac-Ft
100 Ac-Ft
200 Ac-Ft
500 Ac-Ft
1000 Ac-Ft
These curves were developed using the HEC-HMS model to develop Breach Outflow Hydrographs
and Channel Routings for multiple trials of Hypothetical Breach Floods at Varying Channel Distances
and Reservoir Volumes
The Routing was performed using the unsteady flow routine in the HEC-RAS model with hypothetical
channels developed using geometric characteristics (width and slope) of actual stream channels.
Qx values at incremental distances downstream were divided by the Max Flow to produce a Qx/Qp
ratio as a measure of attenuation
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
22/41
The Solution of These Generalized Curves for aThe Solution of These Generalized Curves for a
Particular Breach Path and Max Peak Has BeenParticular Breach Path and Max Peak Has Been
Automated in an Excel WorksheetAutomated in an Excel Worksheet.Input for
Station
Distance
Calculated
Downstream
Distance
Calculated
River Mile
Calculated
Downstream
Distance
Input
Elevation
Calculate
Channel
Elevation
Calculated
Channel Gradient
Measured
Peak Flow
Calculated
Ratio
Calculated
Dam Break
Flow
(ft) (miles) (miles) (ft) (ft) (ft) (ft/ft) (ft/mile) (ft/sec) Qx/Qp Qx (cfs)
Reservoir Edge At
Dam:
(Inundated by Pond)
0.00 0.00 1.73 0.00 2179.05 2179 1008 Interpolated
from Table
1 Breach Path Point 25 223.78 0.04 1.73 223.78 2123.62 2123.62 0.25 1307.94 0.9961 1004.29
2 Breach Path Point 50 451.22 0.09 1.64 451.22 2087.47 2087.47 0.16 839.13 0.9921 1000.26
3 Near Hazard Point 67 604.67 0.11 1.62 604.67 2084.04 2084.04 0.02 117.86 0.9894 997.54
4 Breach Path Point 75 677.74 0.13 1.60 677.74 2084.00 2084.00 0.00 3.19 0.9881 996.24
5 Breach Path Point 100 904.27 0.17 1.56 904.27 2077.72 2077.72 0.03 146.46 0.9841 992.23
6 Breach Path Point 125 1131.70 0.21 1.52 1131.70 2051.22 2051.22 0.12 615.20 0.9801 988.20
7 Near Hazard Point 149 1349.09 0.26 1.47 1349.09 2028.01 2028.01 0.11 563.58 0.9759 983.98
8 Breach Path Point 150 1358.23 0.26 1.47 1358.23 2025.65 2025.65 0.26 1365.88 0.9756 983.709 Breach Path Point 175 1586.58 0.30 1.43 1586.58 1992.73 1992.73 0.14 761.25 0.9688 976.76
10 Breach Path Point 200 1813.10 0.34 1.39 1813.10 1975.23 1975.23 0.08 407.93 0.9619 969.87
11 Near Hazard Point 216 1957.42 0.37 1.36 1957.42 1962.23 1962.23 0.09 475.56 0.9576 965.49
12 Breach Path Point 225 2038.71 0.39 1.34 2038.71 1948.64 1948.64 0.17 882.43 0.9551 963.01
13 Breach Path Point 250 2265.23 0.43 1.30 2265.23 1928.48 1928.48 0.09 469.89 0.9483 956.13
14 Breach Path Point 275 2490.84 0.47 1.26 2490.84 1900.42 1900.42 0.12 656.76 0.9415 949.27
15 Breach Path Point 300 2717.36 0.51 1.22 2717.36 1836.00 1836.00 0.28 1501.64 0.9349 942.61
16 Breach Path Point 325 2943.89 0.56 1.17 2943.89 1778.61 1778.61 0.25 1337.53 0.9287 936.38
17 Breach Path Point 725 6575.56 1.25 0.48 6575.56 1347.14 1347.14 #REF! #REF! 0.7991 805.73
18 Near Hazard Point 739 6702.53 1.27 0.46 6702.53 1331.04 1331.04 0.13 669.62 0.7936 800.14
19 Breach Path Point 750 6803.00 1.29 0.44 6803.00 1318.91 1318.91 0.12 637.66 0.7893 795.77
20 Breach Path Point 775 7029.52 1.33 0.40 7029.52 1288.37 1288.37 0.13 711.77 0.7795 785.91
21 Breach Path Point 800 7256.96 1.37 0.36 7256.96 1255.12 1255.12 0.15 771.90 0.7697 776.01
22 Breach Path Point 825 7483.48 1.42 0.31 7483.48 1225.38 1225.38 0.13 693.32 0.7599 766.14
23 Breach Path Point 8507710.01
1.46 0.27 7710.011197.81
1197.81 0.12 642.66 0.7501 756.28
24 Breach Path Point 875 7936.53 1.50 0.23 7936.53 1168.21 1168.21 0.13 689.94 0.7404 746.56
25 Near Hazard Point 879 7972.15 1.51 0.22 7972.15 1163.69 1163.69 0.13 668.92 0.7392 745.31
26 Near Hazard Point 881 7990.42 1.51 0.22 7990.42 1163.00 1163.00 0.04 199.64 0.7386 744.66
27 Breach Path Point 900 8163.97 1.55 0.18 8163.97 1135.27 1135.27 0.16 843.80 0.7325 738.57
28 Breach Path Point 925 8389.58 1.59 0.14 8389.58 1125.68 1125.68 0.04 224.29 0.7247 730.64
29 Near Hazard Point 932 8453.51 1.60 0.13 8453.51 1124.78 1124.78 0.01 74.20 0.7224 728.39
30 Near Hazard Point 935 8480.00 1.61 0.12 8480.00 1123.11 1123.11 0.06 334.54 0.7215 727.46
31 Breach Path Point 950 8617.01 1.63 0.10 8617.01 1114.18 1114.18 0.07 343.98 0.7167 722.65
32 Near Hazard Point 955 8662.68 1.64 0.09 8662.68 1111.20 1111.20 0.07 344.81 0.7151 721.04
33 Near Hazard Point 958 8690.08 1.65 0.08 8690.08 1109.51 1109.51 0.06 326.00 0.7142 720.08
34 Breach Path Point 975 8844.45 1.68 0.05 8844.45 1103.10 1103.10 0.04 219.11 0.7088 714.66
35 Breach Path Point 1000 9070.06 1.73 0.00 9134.00 1102.01 1102.01 0.00376 19.86 0.6987 704.48
Order
NumberStation Description
Flood Segment Point
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
23/41
Excel Worksheet Interpolates Attenuation Ratio from AttenuationExcel Worksheet Interpolates Attenuation Ratio from Attenuation
Lookup Table and Calculates Flows and Velocities at IncrementalLookup Table and Calculates Flows and Velocities at Incremental
DistancesDistancesPeak Breach Flow is AutomaticallyImported from the Dam BreakAnalysis Worksheet
Incremental Breach Path Distanceand Point Elevation are Cut andPasted from Pathway Data FilesGenerated in
In Excel, Bed Slope is calculatedand Channel Type is entered as anIndependent Variable and these areused to estimate Velocity fromempirically derived Tables
The Solution Gives Attenuated DamBreach Flows and AverageVelocities at Incremental Distances
Distance and Elevation Data Tablesare extracted using ArcGISGeoprocessing Tools
Dam Breach Peak Discharge
Description Parameter Input Equation Result
Peak Discharge (cfs) from
Dam Breach during
Normal Pool*
Qp(Normal) = QP = 3.1*Wavg*H1.5
*[A/(A+(t*H1/2
))]3
= 935.05
Peak Discharge (cfs) from
Dam Breach during
Max Pool*
Qp(Max) = QP = 3.1*Wavg*H1.5
*[A/(A+(t*H1/2
))]3
= 1136.51
Inpu for
Station
Distance
Input Water
Surface
Elevation
AttenuationFlow
Velocity
Dam (ft) (ft) Qx (cfs) (ft/sec)
Reservoir Edge At
Dam:
(Inundated by Pond)
0.00 2179.05 1008.25
1 Breach Path Point 25 223.78 2123.62 1004.29 12.00
2 Breach Path Point 50 451.22 2087.47 1000.26 12.00
3 Hazard 1 (67) 604.67 2084.04 997.54 6.57
4 Breach Path Point 75 677.74 2084.00 996.24 1.10
5 Breach Path Point 100 904.27 2077.72 992.23 7.32
6 Breach Path Point 125 1131.70 2051.22 988.20 12.00
7 Hazard 2 (149)1349.09 2028.01
983.98 12.00
Order
Number
Station
DescriptionFlood Segment Point
5 2.4 5 1.7 5 1.4
10 3.4 10 2.4 10 1.9
15 4.1 15 3.0 15 2.4
20 4.8 20 3.5 20 2.7
30 5.8 30 4.2 30 3.3
40 6.7 40 4.9 40 3.8
60 8.2 60 6.0 60 4.7
80 9.5 80 6.9 80 5.4
100 10.6 100 7.7 100 6.1
200 12.0 200 10.9 200 8.6
300 12.0 300 12.0 300 10.5
400 12.0 400 12.0 400 12.0
>400 12.0 >400 12.0 >400 12.0
Velocity
(ft/sec)
Bedslope
(ft/mi)
Velocity
(ft/sec)
Velocity
(ft/sec)
Type 3Main Channel - Gravel,
Coobles, & Bolders
Overbanks - Wooded
Type 1Main Channel - Gravel
Overbanks - Grass, Pasture
Bedslope
(ft/mi)
Bedslope
(ft/mi)
Type 2Main Channel - Gravel,
Cobbles
Overbanks - Irregular,
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
24/41
Create Incremental Elevations and Distances forCreate Incremental Elevations and Distances for
Breach Points Along Breach PathBreach Points Along Breach PathTo calculate the Attenuation of thePeak, Data Tables for Distances and
Elevations at Specific Points alongthe Breach Path Are Needed forExport as dbf files
Several Methods Are AvailableUsing ArcGIS Geoprocessing Tools,But ET GeoWizard 9.2 (freeware)Offers Simple Automated Tool:Station Points
Tool Allows the Selection of a SetDistance Between Points to AddStation Points to 3D PolylineBreach Path 3D (Created using 3D-Analyst : Convert : Features to 3D)
1. Save duplicate of Breach Path 3D usingData : Export Data
2. Open ET GeoWizards 9.2 : Point : CreateStation Points Save output file asBreachpath3DPoints
3. Enter value for Set distance betweenstations
4. Field Calculator enter the flowing script:PerctDist = Et_Station/ Length ToCalculate the Percent Distance
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
25/41
Identify Structures At Risk Along Breach Path by ComparingIdentify Structures At Risk Along Breach Path by Comparing
Underlying Orthophotos to Contour Elevations,Underlying Orthophotos to Contour Elevations,
Creating Centroidal Hazard PointsCreating Centroidal Hazard Points
Create Contour Elevations using both SpatialAnalysts Surface Analyst : Contour Tool
and the Clipped DEM
Use Drawing Tool to circle those Structures
that could be inundated by the Breach Flood
(Identified by Contours to be within a 4 to 6
foot elevation, orthogonal to Breach Path
polyline)
Use XTools : Feature Conversions :
Convert Graphics to Shapes tool to convert
first circle graphic to a shape file
Use Editor : Copy & Move tools to copy
and move this initial circle to other
structures this will create a list of hazard
features in a shape file
Create a Properties At Risk Points shape
file from this circle feature using Tool Boxs
Data Management Tools : Features :
Feature to Points
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
26/41
The Attenuation Analysis Requires that We Identify Points on BreachThe Attenuation Analysis Requires that We Identify Points on Breach
Path that Are Spatially Coincident to the Structures At Risk PointsPath that Are Spatially Coincident to the Structures At Risk Points
Use Tool Boxs Analysis Tools : Proximity :
Near Tool to find points on the Breach Paththat are nearest to the Properties At Risk
Points
Make copy of the Properties At Risk Points
shape file using Export data and use
Properties At Risk Points Dummy as the
Input Features for the Near Tool
Add the Breach Path Points3D shape file, as
the Near feature - This will Choose Points on
the Breach Path Adjacent to the Properties At
Risk Points
Check the Location and Angleboxes and
set the Environments : General Setting :
Output Coordinate System to the ProperProjection
Open the Attribute Table and save the table
as a data dbf file using the Export tool in the
Options Menu. Save as Adjacent Points.dbf
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
27/41
Create X, Y, Z Coordinated for Each PointCreate X, Y, Z Coordinated for Each Point
Create a new shape file from the dbf table using theAdd XY Data tool in the Tools dropdown menu thiscreates a new Events feature.
Use the NEAR_X field for the X coordinates and theNEAR_Y field for the Y coordinates
Set the Input Coordinate System to the ProperProjection
Convert Events Feature to a 3D feature (Point ZM)using the DEM and 3D Analysts "Convert : Featuresto3D", saving as a new 3D Feature Save as AdjacentPoints 3D
Remove Original Events Feature
Add the Z coordinate using XTools : TableOperations : Add X,Y,Z Coordinates. Be sure that theOnly for 3D shapes box is checked and specify theProper output projection. Save as Adjacent Points XYZ
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
28/41
Delineate Distances for Points on the Breach PathDelineate Distances for Points on the Breach Path
To add a Distance Along the Breach Path to each
points, Join Adjacent Points XYZ to Breach
Path Points 3D retaining only those record that
match
Select Join attribute from a table in Adjacent
Points XYZ Choose the field Near_FID for the
field that the join will be based on
Choose Breach Path Points 3D as the shape file
table that is to be joined
Choose the FIDfield from the Breach Path
Points3D shape file as the field that the join is to
be based on
Check the Advances : Keep only matching
records box
Select all Features in the Attribute Table and then
open Data : Export Data Make sure that the
Export is set to select features and save as a
New feature: Adjacent Points XYZ & Distance
Open Attribute Tables and Remove Unnecessary
Fields.
S l t E 25th (i t l f i t t d) P i t Al thS l t E 25th (i t l f i t t d) P i t Al th
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
29/41
Select Every 25th (interval of interested) Point Along theSelect Every 25th (interval of interested) Point Along the
Breach Path and Create a Selected Interval Breach Points ShapeBreach Path and Create a Selected Interval Breach Points Shape
FileFileExport a copy of the Breach Path 3D Points file byselecting Data : ExportData. Save as a dummy file thatcan eventually be eliminated Breach Path 3D PointsDummy .
Open Attributes table, open Options tab, right clickAdd Field and add a new field. - Name it ( i.e.Select25th) and select Type as Long Integer
Open the Field Calculator for Select25th Enter thefollowing Pre-Logic Script Code:
Dim a as Double
IF ( [FID] Mod 25 ) = 0 Then
a = [FID]
End If
Set Select25th = to a
Select desired records interval Open Options tab andright click Select by Attribute In Calculation windowEnter
Select25th >0 x
Save using the Data : Export Data tool. Rename SelectedBreach Path Points
Remove Dummy File
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
30/41
Merge Adjacent Points 3D & Distance and Selected Breach PathMerge Adjacent Points 3D & Distance and Selected Breach Path
Points to Create Distance and Elevation Table of Selected IntervalsPoints to Create Distance and Elevation Table of Selected Intervals
Along Breach PathAlong Breach Path
In ArcToolboxuse Data Management Tools :
General : Merge Add both to Input Datasets
Stipulate the output dataset:
Every25th&AdjacentBreachPoints as the saved
shape file
This will merge important field such as ET_Order,
ET_Z, and Distance. ET_Order can be used to sort
all records from lowest to Highest Distance and
Highest to lowest Elevation
Open Attribute Table and Export as a dbf file.
This can be open in Excel
Used Distance & Elevation Fields for
Input into Flood Attenuation Excel
Spreadsheets Cut & Paste Distance
and Elevation data into appropriate
cells
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
31/41
Output From Distance and Elevation AnalysisOutput From Distance and Elevation Analysis
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
32/41
Distance and Elevation is Exported to the Excel Attenuation WorksheetDistance and Elevation is Exported to the Excel Attenuation Worksheet
Input for
Station
Distance
Calculated
Downstream
Distance
Calculated
River Mile
Calculated
Downstream
Distance
Input
Elevation
(ft) (miles) (miles) (ft) (ft)
Reservoir Edge At
Dam:
(Inundated by Pond)
0.00 0.00 1.73 0.00 2179.05
1 Breach Path Point 25 223.78 0.04 1.73 223.78 2123.62
2 Breach Path Point 50 451.22 0.09 1.64 451.22 2087.47
3 Near Hazard Point 67 604.67 0.11 1.62 604.67 2084.04
4 Breach Path Point 75 677.74 0.13 1.60 677.74 2084.00
5 Breach Path Point 100 904.27 0.17 1.56 904.27 2077.72
6 Breach Path Point 125 1131.70 0.21 1.52 1131.70 2051.22
7 Near Hazard Point 149 1349.09 0.26 1.47 1349.09 2028.01
8 Breach Path Point 150 1358.23 0.26 1.47 1358.23 2025.65
9 Breach Path Point 175 1586.58 0.30 1.43 1586.58 1992.73
10 Breach Path Point 200 1813.10 0.34 1.39 1813.10 1975.23
11 Near Hazard Point 216 1957.42 0.37 1.36 1957.42 1962.23
12 Breach Path Point 225 2038.71 0.39 1.34 2038.71 1948.64
13 Breach Path Point 250 2265.23 0.43 1.30 2265.23 1928.48
14 Breach Path Point 275 2490.84 0.47 1.26 2490.84 1900.42
15 Breach Path Point 300 2717.36 0.51 1.22 2717.36 1836.0016 Breach Path Point 325 2943.89 0.56 1.17 2943.89 1778.61
17 Breach Path Point 350 3169.50 0.60 1.13 3169.50 1730.39
18 Breach Path Point 375 3396.93 0.64 1.09 3396.93 1680.47
19 Breach Path Point 400 3623.46 0.69 1.04 3623.46 1645.82
20 Breach Path Point 425 3849.98 0.73 1.00 3849.98 1622.42
21 Breach Path Point 450 4077.42 0.77 0.96 4077.42 1592.17
22 Breach Path Point 475 4304.85 0.82 0.91 4304.85 1567.49
23 Breach Path Point 500 4532.29 0.86 0.87 4532.29 1545.85
24 Breach Path Point 525 4758.81 0.90 0.83 4758.81 1525.00
25 Breach Path Point 550 4986.25 0.94 0.79 4986.25 1509.39
26 Breach Path Point 575 5212.77 0.99 0.74 5212.77 1492.14
27 Breach Path Point 600 5438.38 1.03 0.70 5438.38 1471.54
28 Breach Path Point 625 5666.73 1.07 0.66 5666.73 1448.50
29 Breach Path Point 650 5893.25 1.12 0.61 5893.25 1424.11
30 Breach Path Point 675 6120.69 1.16 0.57 6120.69 1394.60
31 Breach Path Point 700 6348.13 1.20 0.53 6348.13 1373.22
32 Breach Path Point 725 6575.56 1.25 0.48 6575.56 1347.1433 Near Hazard Point 739 6702.53 1.27 0.46 6702.53 1331.04
34 Breach Path Point 750 6803.00 1.29 0.44 6803.00 1318.91
35 Breach Path Point 775 7029.52 1.33 0.40 7029.52 1288.37
36 Breach Path Point 800 7256.96 1.37 0.36 7256.96 1255.12
37 Breach Path Point 825 7483.48 1.42 0.31 7483.48 1225.38
38 Breach Path Point 850 7710.01 1.46 0.27 7710.01 1197.81
39 Breach Path Point 875 7936.53 1.50 0.23 7936.53 1168.21
40 Near Hazard Point 879 7972.15 1.51 0.22 7972.15 1163.69
41 Near Hazard Point 881 7990.42 1.51 0.22 7990.42 1163.00
42 Breach Path Point 900 8163.97 1.55 0.18 8163.97 1135.27
43 Breach Path Point 925 8389.58 1.59 0.14 8389.58 1125.68
44 Near Hazard Point 932 8453.51 1.60 0.13 8453.51 1124.78
45 Near Hazard Point 935 8480.00 1.61 0.12 8480.00 1123.11
46 Breach Path Point 950 8617.01 1.63 0.10 8617.01 1114.18
47 Near Hazard Point 955 8662.68 1.64 0.09 8662.68 1111.20
48 Near Hazard Point 958 8690.08 1.65 0.08 8690.08 1109.51
49 Breach Path Point 975 8844.45 1.68 0.05 8844.45 1103.10
50 Breach Path Point 1000 9070.06 1.73 0.00 9134.00 1102.01
Order
Number
Station
DescriptionFlood Segment Point
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
33/41
Estimation of Breach Path Profile Top Widths & DepthsEstimation of Breach Path Profile Top Widths & Depths
Has Also Been Automated in an Excel WorksheetHas Also Been Automated in an Excel Worksheet
Calculated
Downstream
Distance
Calculate
Channel
Elevation
Average
Inverse Slope
of Channel
Walls
Average
Inverse Slope
of Reach Wall
Cross
Sectional
Area in
Flood
Depth of
Flood
Water
Surface
Elevation
0Reservoir
At
Left Interval
(ft)
Right Interval
(ft)
Left (ft) Right (ft) (miles) (ft)Z(Left)(ft/ft)
Z (Right)(ft/ft)
Z(Inverse)(ft/ft)
Z(Average)(ft/ft)
(ft2) (ft) (ft) Left (ft) Right (ft)
1 Breach Path Point 25 0.10 7.31 400.00 400.53 0.04 2123.62 0.0003 0.0183 108.0905 108.0905 83.69 0.20 2123.82 812.70 11.13
2 Breach Path Point 50 8.11 3.07 100.14 121.51 0.09 2087.47 0 .0809 0.0252 18.8385 63.4645 83.35 1.79 2089.26 22.12 70.97
3 Hazard 1 (67) 0.10 31.37 404.34 517.86 0.11 2084.04 0.0002 0.0606 32.8814 25.8599 151.86 0.27 2084.32 1105.91 4.52
4 Breach Path Point 75 0.50 6.54 100.00 100.97 0.13 2084.00 0 .0050 0.0647 28.6703 30.7758 907.27 2.91 2086.91 578.41 44.97
5 Breach Path Point 100 5.83 2.75 102.70 100.00 0.17 2077.72 0.0567 0.0275 23.7383 26.2043 135.63 2.24 2079.96 39.50 81.50
6 Breach Path Point 125 12.57 5.07 102.70 100.00 0.21 2051.22 0 .1224 0.0507 11.5486 17.6435 82.35 2.43 2053.65 19.85 47.90
7 Hazard 2 (149) 2.82 18.11 100.00 100.00 0.26 2028.01 0.0282 0.1811 9.5553 10.5520 82.00 2.00 2030.01 70.97 11.04
8 Breach Path Point 150 3.53 19.37 100.00 100.00 0.26 2025.65 0.0353 0.1937 8.7349 9.1451 81.97 2.21 2027.86 62.72 11.42
9 Breach Path Point 175 2.48 9.76 100.99 100.00 0.30 1992.73 0 .0245 0.0976 16.3730 12.5540 81.40 1.79 1994.51 72.85 18.29
10 Breach Path Point 200 0.36 9.64 420.73 400.00 0.34 1975.23 0.0009 0.0241 80.1499 48.2615 80.82 0.37 1975.59 425.64 15.22
11 Hazard 3 (216) 1.32 2.59 200.00 201.51 0.37 1962.23 0 .0066 0.0128 102.9300 91.5400 80.46 0.84 1963.06 127.13 65.1412 Breach Path Point 225 4.88 16.18 412.15 411.41 0.39 1948.64 0.0118 0.0393 39.1045 71.0172 80.25 1.21 1949.85 102.13 30.73
13 Breach Path Point 250 22.40 2.21 425.29 399.15 0.43 1928.48 0.0527 0.0055 34.3603 36.7324 79.68 0.89 1929.38 16.94 161.57
14 Breach Path Point 275 3.37 3.28 100.00 100.00 0.47 1900.42 0 .0337 0.0328 30.0996 32.2300 79.11 1.62 1902.04 48.11 49.49
15 Breach Path Point 300 10.78 16.05 101.02 102.70 0.51 1836.00 0.1067 0.1563 7.6041 18.8519 78.55 3.16 1839.15 29.57 20.20
16 Breach Path Point 325 35.06 35.92 100.00 100.00 0.56 1778.61 0.3506 0.3592 2.8179 5.2110 78.03 5.26 1783.88 15.01 14.65
17 Breach Path Point 350 62.87 34.93 102.65 100.00 0.60 1730.39 0.6125 0.3493 2.0796 2.4488 77.51 5.87 1736.26 9.59 16.8118 Breach Path Point 375 78.53 33.76 100.14 105.12 0.64 1680.47 0.7842 0.3211 1.8094 1.9445 76.99 5.92 1686.40 7.55 18.44
19 Breach Path Point 400 60.77 36.41 100.00 100.00 0.69 1645.82 0.6077 0.3641 2.0579 1.9337 76.47 5.90 1651.72 9.71 16.21
20 Breach Path Point 425 41.20 37.96 100.00 100.00 0.73 1622.42 0.4120 0.3796 2.5267 2.2923 75.96 5.48 1627.90 13.30 14.43
21 Breach Path Point 450 46.60 11.05 100.00 100.12 0.77 1592.17 0.4660 0.1104 3.4699 2.9983 75.38 3.67 1595.84 7.87 33.23
22 Breach Path Point 475 42.29 22.10 100.00 100.00 0.82 1567.49 0.4229 0.2210 3.1058 3.2879 74.76 4.66 1572.15 11.01 21.08
23 Breach Path Point 500 32.01 13.19 99.14 108.24 0.86 1545.85 0.3229 0.1218 4.4970 3.8014 74.14 3.62 1549.47 11.22 29.73
24 Breach Path Point 525 28.11 25.79 100.00 105.09 0.90 1525.00 0.2811 0.2454 3.7984 4.1477 73.52 4.39 1529.39 15.62 17.88
25 Breach Path Point 550 18.62 33.15 101.02 100.00 0.94 1509.39 0.1843 0.3315 3.8773 3.8378 76.30 4.25 1513.64 23.07 12.83
26 Breach Path Point 575 13.11 16.72 100.00 101.02 0.99 1492.14 0.1311 0.1655 6.7423 5.3098 72.28 3.25 1495.39 24.80 19.65
27 Breach Path Point 600 21.54 18.47 100.00 100.99 1.03 1471.54 0.2154 0.1829 5.0209 5.8816 71.49 3.76 1475.30 17.46 20.56
28 Breach Path Point 625 42.03 25.94 108.24 99.14 1.07 1448.50 0.3883 0.2617 3.0769 4.0489 70.61 4.70 1453.20 12.10 17.96
29 Breach Path Point 650 38.07 46.22 100.00 100.00 1.12 1424.11 0.3807 0.4622 2.3728 2.7248 69.75 5.40 1429.51 14.17 11.68
30 Breach Path Point 675 54.72 35.58 100.00 100.00 1.16 1394.60 0.5472 0.3558 2.2149 2.2939 68.88 5.45 1400.05 9.96 15.3231 Breach Path Point 700 42.31 58.59 105.09 100.00 1.20 1373.22 0.4026 0.5859 2.0232 2.1191 68.01 5.70 1378.92 14.15 9.72
32 Breach Path Point 725 51.10 43.23 99.14 108.24 1.25 1347.14 0.5154 0.3994 2.1862 2.1047 67.14 5.50 1352.64 10.67 13.76
33 Hazard 4 (739) 47.31 49.09 108.24 99.14 1.27 1331.04 0.4371 0.4951 2.1453 2.1658 66.68 5.56 1336.61 12.73 11.24
34 Breach Path Point 750 47.19 41.66 100.00 100.00 1.29 1318.91 0.4719 0.4166 2.2510 2.1981 66.31 5.42 1324.32 11.48 13.00
35 Breach Path Point 775 28.05 24.96 100.00 100.00 1.33 1288.37 0.2805 0.2496 3.7724 3.0117 65.49 4.16 1292.53 14.83 16.66
36 Breach Path Point 800 32.91 17.81 100.00 100.00 1.37 1255.12 0.3291 0.1781 3.9433 3.8579 64.67 3.87 1258.99 11.75 21.71
37 Breach Path Point 825 0.34 20.87 100.00 100.00 1.42 1225.38 0.0034 0.2087 9.4259 6.6846 63.85 0.66 1226.03 191.16 3.1538 Breach Path Point 850 7.43 10.91 100.00 100.00 1.46 1197.81 0 .0743 0.1091 10.9051 10.1655 63.02 2.36 1200.17 31.77 21.64
39 Breach Path Point 875 11.59 3.19 105.12 100.14 1.50 1168.21 0 .1102 0.0318 14.0795 12.4923 62.21 1.75 1169.96 15.90 55.08
40 Hazard 5 (879) 10.79 7.70 99.14 108.24 1.51 1163.69 0 .1088 0.0711 11.1140 12.5967 62.11 2.31 1166.00 21.24 32.49
41 Hazard 6 (881) 9.36 8.39 100.00 102.65 1.51 1163.00 0 .0936 0.0817 11.4042 11.2591 87.30 2.76 1165.76 29.48 33.77
42 Breach Path Point 900 25.82 12.67 108.24 99.14 1.55 1135.27 0.2386 0.1278 5.4583 8.4313 61.55 3.20 1138.47 13.42 25.0443 Breach Path Point 925 0.60 6.46 108.24 98.48 1.59 1125.68 0.0056 0.0656 28.1138 16.7861 80.85 0.91 1126.59 163.84 13.87
44 Hazard 7 (932) 1.40 5.48 200.90 200.00 1.60 1124.78 0 .0070 0.0274 58.2226 43.1682 139.47 1.25 1126.03 178.57 45.48
45 Hazard 8 (935) 2.32 4.55 200.00 200.00 1.61 1123.11 0 .0116 0.0227 58.2785 58.2505 66.03 1.01 1124.11 86.86 44.30
46 Breach Path Point 950 0.45 2.48 200.00 200.00 1.63 1114.18 0 .0023 0.0124 136.5657 97.4221 64.69 0.50 1114.68 220.45 40.08
47 Hazard 9 & 10 (955) 5.99 2.21 400.00 402.77 1.64 1111.20 0 .0150 0.0055 97.8045 117.1851 64.47 0.72 1111.92 48.06 131.21
48 Hazard 11 (958) 4.52 3.90 400.00 406.87 1.65 1109.51 0 .0113 0.0096 95.8118 96.8082 66.20 0.83 1110.33 73.38 86.44
49 Breach Path Point 975 0.00 5.45 449.40 406.01 1.68 1103.10 0.0000 0.0134 148.7879 122.2999 80.01 0.03 1103.13 4630.22 2.57
50 Breach Path Point 1000 1.09 0.10 416.92 400.00 1.73 1102.01 0.0026 0.0002 696.6848 422.7364 260.61 0.34 1102.36 131.60 1379.60
Input
Distance to Contour Lines
from
Center of Channel
Order
NumberChannel Input
Contour Line Elevation Interval
Station DescriptionCross Section
Slope of Channel
WallsInundation Flood Plain
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
34/41
Automated Spreadsheet Requires the Input of SequentialAutomated Spreadsheet Requires the Input of Sequential
Channel Contour Elevation Intervals and Distance IntervalsChannel Contour Elevation Intervals and Distance Intervals
Channel profile Elevation and Distance Intervals can
be extracted using ArcGIS Geoprocessing tools and
cut and pasted into spreadsheet cells for Automatic
Calculation
This requires the creation ofBuffer Zones around the
Breach Path and the delineation ofLeft and Right
Bank Lines
The Goal is to create dbf tables ofChannel Profiles
from which Slopes can be calculated at specific
stations along the Breach path
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
35/41
Delineate a Left and Right Bank Polygons fromDelineate a Left and Right Bank Polygons from
Buffer Zones of Varying WidthsBuffer Zones of Varying Widths
In ArcToolBox, use the Analyst Tools : Proximity :Buffer tool to create a buffer around the Breach
path
Enter Input Feature : Breach Path & Output
Feature Class : BreachPathXXX???Buffer
Its best to use a well-defined nomenclature to
keep track of files, where
xxx= Distance
??? = Left of Right
Enter Linear unit as distance from Breach Path
to Outer Boundary of the Buffer
Create Buffer Boundary Line usingXTools : Feature Conversions : Convert Polygons
to Polylines or ArcToolbox : Data Management
Tool : Features : Polygon To Line - Name
feature: i.e. BreachPathXXXBuffer???Polyline
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
36/41
Find Distance from the Breach Path to theFind Distance from the Breach Path to the
Left and Right Outer Boundary LinesLeft and Right Outer Boundary Lines
Use Editor : Spit Tool to split the Inner Boundary
of the Polyline from the Outer Boundary, Creatingan single Outer Polyline
1. Left Click Editor and choose Start Editing Polyline
2. Use Edit Tool to select the Polyline feature - reveal
vertices
3. Use split tool to clip a vertex on the Bottom and Top of
Polygon outline
4. Delete the Inner Boundary, leaving only the OuterBoundary Polyline
5. Save and close Editor
Convert Polyline to 3D using 3D Analyst : Convert
: Features to 3D
Use this Polyline as the Outer Boundary of buffer
around the Breach Path
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
37/41
Find Distance from Selected Points on Breach Path to theFind Distance from Selected Points on Breach Path to the
Nearest Point of the Right and Left Outer Boundary LinesNearest Point of the Right and Left Outer Boundary Lines
Use ToolBoxs Analysis Tools : Proximity : Near Tool tofind points and distances for selected Points on the BreachPath to the nearest segment of the Left or Right Polylinesforming the outer boundaries of the buffer.
1. Use dummy Every25th&NearHazardBreachPoints as the InputFeature
2. Use The Right or Left Polyline as the Near Feature
3. Check Location and Angle boxes
4. Open point file Attribute table and save as dbf file in Options :Export as OuterXXXBuffer???AdjacentPoints
5. This will give you Distances and the x & Y coordinates for pointsadjacent to selected points on the Breach Path
Use Tools : Add XY Data as outlined before to Create aPoints Event file of the Boundary Polyline
1. Open Tools : Add XY Data and choose the OuterXXXBuffer???AdjacentPoints dbf table
2. Use the NEAR_X field for the X coordinates and the NEAR_Y fieldfor the Y coordinates
3. Convert Event file to 3D Feature Using 3D-Analyst and save asOuterXXXBuffer???AdjacentPoints3D
Find Z-Value elevation for all points on the BufferPolyline using XTools : Table Operations : Add X,Y,ZCoordinates
Repeat for other boundary widths adjacent
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
38/41
Cut and Paste Data into Breach Attenuation Calculation Excel SpreadsheetsCut and Paste Data into Breach Attenuation Calculation Excel Spreadsheets
This will require sorting to put the data from thepoints on the Breach Path into ascending Distanceand descending Elevation
Multiple Boundaries may be necessary to accountfor Channel Profile variations
For each Hazard Point along the Breach Path aChange in Elevation for a Known Distances to theContour Boundary can be exported to and ExcelFile then Cut & Pasted into the AttenuationWorksheet
From this Data, in conjunction with previouslycalculated Peak Breach Flow Volume the followingcan be calculated at selected points, :
1. The Cross Sectional Flood Area for every selected pointalong the Breach Path
2. The Average Depth Of Flood for every selected point alongthe Breach Path
3. The Water Surface Elevation of the flood at every selected
point along the Breach Path
4. The Flood Top Width at every selected point along theBreach Path
From previous Calculation We also have
5. Attenuation Of Peak Flow for every selected point alongthe Breach Path
6. Velocity Of The Peak Flow at every selected point alongthe Breach Path
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
39/41
Depth and Velocity Data At Each Hazard Point is Used inDepth and Velocity Data At Each Hazard Point is Used in
A Hazard Assessment AnalysisA Hazard Assessment Analysis
Attenuation determines The Breach FloodProfile downstream of the breach
Top Widths and Water Surface Elevationallow us to determine if the structures arelikely to be Inundated
Average Depth and Velocity allow us toPrioritize the Hazard to persons andproperty
Hazard Assessment Curve For Flood Danger To Adults
from Flood Velocity And Flood Depth Developed by
The United State Bureau of Reclamation (USBR)
Left (ft) Right (ft) Left (ft) Right (ft)
Reservoir Edge At Dam:
(Inundated by Pond)
Breach Path Point 25
Breach Path Point 50
Near Hazard Point 67 109.00 Sheds
Breach Path Point 75
Breach Path Point 125Near Hazard Point 149 72.00 Clubhouse
Breach Path Point 150
Breach Path Point 200
Near Hazard Point 216 77.00 Utility Building
Breach Path Point 225
Breach Path Point 725
Near Hazard Point 739 18.00 Unknown
Breach Path Point 750
Breach Path Point 875
Near Hazard Point 879 102.00 Residence 5
Near Hazard Point 881 140.00 Residence 6
Breach Path Point 900Breach Path Point 925
Near Hazard Point 932 11.00 Shed/Residence 7
Near Hazard Point 935 51.00 Residence 8
Breach Path Point 950
Near Hazard Point 955 42.00 Residence 10
Near Hazard Point 958 86.00 Residence 11
Station Description
Flood Segment Point
Hazard Location of Structures(Distance from Breach Path)
Type of Structure
AtRisk
Judgment ZoneLow Hazard
Zone
High HazardZone
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
40/41
With These Techniques We CanWith These Techniques We Can
Efficiently and EffectivelyEfficiently and Effectively
Determine Dam Breach Flood Impacts on The PublicDetermine Dam Breach Flood Impacts on The Public
This Analysis Allows Us to:
Select Design & Performance Goals for Critical Project Elements
Assign a Preliminary Design Step
Select Proper Design Storm Criteria for that Design Step
Evaluate the Adequacy of Current Embankment Designs
Prepare Emergency Action Plans
-
8/3/2019 Environmental Gis Tues Hoyle-Dodson WADOE
41/41
. . . The importance of the universal machine is clear. We do
not need to have an infinity of different machines doing
different jobs. A single one will suffice. The engineering
problem of producing various machines for various jobs is
replaced by the office work of "programming" the universal
machine to do these jobs. (Alan Turing 1948)
ArcGIS: A Universal Turing Machine?ArcGIS: A Universal Turing Machine?