What I usually suggest is that the breach can be modeled using HMS, but downstream of the dam, RAS should be used. ![]() Furthermore, there is no direct method for mapping flood inundation from an HMS model. In short, HMS is okay for routing water from A to B, but if you are interested at all in what is happening between A and B, HMS is not appropriate. Plus, backwater will not be fully accounted for using any of the HMS routing techniques-meaning you can not simulate flow attenuation properly. HMS uses hydrologic streamflow routing which is a simplification of full dynamic routing. ![]() ![]() However, routing the breach outflow downstream using HMS is very limited. Using HMS to perform a dam breach has its advantages, namely that it is easy to set up, the data requirements are minimal, and it is numerically stable.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |