Introduction

Reservoir plays an important role in flood control and drought resistance. However, it also poses a potential risk to the downstream. By the end of 2020, there were 3369 dam-breaks in China, of which 1737 were caused by overtopping, accounting for 51.7% of the total. Most of them were embankment dams1. The risk of overtopping failure of embankment dams is widely concerned by the industry.

A series of achievements have been made on the mechanism, simulation, probability, consequence and flood routing of overtopping failure of embankment dam2. Relevant specifications of flood risk mapping for dam breach have been documented and flood risk maps have been widely produced3. However, there are great uncertainties in reservoir inflow process, dam breach process and flood routing process, which affect the accuracy of risk analysis4. As a result, unnecessary waste in emergency dispatching may be caused by inaccurate dam breach flood analysis.

At present, researches on the failure mechanism of embankment dams are relatively comprehensive and in-depth5,6. Many mature numerical simulation models for dam failure have been developed. For example, BREACH7, DAMBRK8, MIKE DB9, Chen Shengshui Model10, HEC-RAS Model11, BRDAM12, IWHR DB13, BEED14, etc., have been widely adopted at home and abroad. The models above are all deterministic analysis models. The uncertainty of the model results is mostly analyzed from the aspects of sensitivity15. However, sensitivity analysis could not consider the probability distribution of the stochastic variables. And the variables have not been considered in actual reasonable parameter ranges. Therefore, the influence of individual parameter uncertainty on model results may be misestimated. The stochastic process analysis and uncertainty simulation of dam overtopping failure are relatively inadequate.

On the other hand, as the dam breach risk is generally defined as the product of dam breach probability and dam breach consequence, the results of uncertain factors are mostly concerned in the probability of dam breach. The uncertainty of the dam breach consequences is seldom considered, and the related uncertainty researches mostly start from the aspects of various of losses caused by dam breach16. For example, Qi et al. studied the randomness of property distribution and loss rate curve in flood risk assessment17. De Bruijn et al. used Monte Carlo method to evaluate the annual expected life loss and draw the probability curve of life loss by sampling the maximum flow, maximum water depth, location of the outburst and population refuge ratio during the typical return period18. Jiao et al. proposed a new fuzzy model to sequence the life loss risk consequences caused by dam failure where the relative difference formula was improved through logarithmic transformation and boundary constraint19. In fact, due to a variety of uncertainties, the simulation results of flood routing, which determine the consequences of dam breach, have also significant uncertainty. Mazzoleni et al. drew an uncertain flood risk map considering the uncertainty of location, geometry, and the formation process of the levee piping breach20. Bates et al. studied the uncertainty of flood routing model based on grid simulation, in which the un certainty effect of Manning roughness parameter on the water level of typical cross section in flooded area is mainly analyzed21. However, the above study is not coupled with the uncertainty of dam breach discharge process. In general, the research on the uncertainty analysis of flood routing caused by overtopping failure of embankment dam is relatively inadequate. The reliability of dam breach risk analysis needs to be further studied.

In this paper, the uncertainty in the discharge process of overtopping flood is analyzed. The stochastic process of overtopping dam breach is simulated by restoring to various breach models. And the reliability of flood risk mapping is verified through an engineering example which could solidate the dam risk management foundation and serve as a technical support and reference for similar projects.

Uncertain flood routing analysis method for overtopping failure of embankment dam

General method of flood routing simulation for overtopping failure of embankment dam

The flood routing for overtopping failure of embankment dam generally contains two steps of simulations: the overtopping failure simulation of embankment dam and the flood routing simulation.

Overtopping breach models of embankment dam

The dam breach model is a technique to estimate the breach parameters (shape, height, width, final forming time, etc.) and then predict the discharge process which could be divided into mechanism model, parametric model and semi-empirical model.

Mechanism models are established due to the physical mechanism of the dam failure process based on the historical dam failure cases and laboratory tests. Those models commonly involve flow routing model, erosion model and breach expansion model. For example, BREACH, DAMBRK, MIKE DB, IWHR DB, etc. Their main erosion models served as governing equations are as follows:

$$ \left\{ \begin{gathered} q_{b} = 3.64\left( {\frac{{d_{90} }}{{d_{30} }}} \right)^{0.2} P\frac{{D^{2/3} }}{n}S^{1.1} (DS - \Omega ) \hfill \\ \Omega = 0.005\tau_{c} d_{50} {\text{ (cohesionless soil)}} \hfill \\ \Omega = \frac{{b^{\prime}}}{62.4}(PI)^{{c^{\prime}}} {\text{ (cohesive soil}}) \hfill \\ \Delta H_{c} = 3600\Delta tq_{b} /[PL(1 - n_{0} )] \hfill \\ \end{gathered} \right.\quad ({\text{BREACH}}) $$
(1)
$$ \left\{ {\begin{array}{*{20}l} {b_{b} = b(t_{b} /t)} \hfill & {0 < t_{b} < t} \hfill \\ {h_{b} = h_{d} - (h_{d} - h)\frac{{t_{b} }}{t}} \hfill & {0 < t_{b} < t} \hfill \\ \end{array} } \right.\quad ({\text{DAMBRK}}) $$
(2)
$$ \left\{ \begin{gathered} q_{s} = 0.05V^{2} \left( {\frac{{d_{50} }}{g(s - 1)}} \right)^{0.5} \left( {\frac{\tau }{{\rho g(s - 1)d_{50} }}} \right)^{1.5} \hfill \\ \frac{dh}{{dt}} = \frac{{q_{s} }}{L(1 - \varepsilon )} \hfill \\ \frac{db}{{dh}} = 2x \, \quad \, x \in [0.5,1] \hfill \\ \end{gathered} \right.\quad ({\text{MIKE DB}}) $$
(3)
$$ \left\{ \begin{gathered} \frac{\Delta z}{{\Delta t}} = \Phi (\tau ) = \frac{v}{a + bv} \hfill \\ v = k(\tau - \tau_{c} ) \hfill \\ \end{gathered} \right.\quad ({\text{IWHR DB}}) $$
(4)

where qb is discharge per unit width; d30, d50, d90 are respectively particle sizes accounting for 30%, 50% and 90% of soil mass; P is wetted perimeter; D is breach water level; n is roughness coefficient; S is inverse of downstream slope; τc is critical shear stress; PI is plastic index; ∆Hc is erosion depth per unit time; L is erosion length of breach channel; n0 is void ratio; b′, c′ are empirical coefficients; bb is breach bottom width at time tb; b is final breach bottom width; t is total breach time; hb is breach bottom elevation at time tb; hd is breach depth at time tb determined by a regression equation; h is final breach bottom elevation; qs is sediment transport rate; V is flow velocity; s is soil relative density; τ is shear stress; ρ is water density; h is breach depth; b is breach width; L is erosion length of breach channel; z is erosion depth; v is shear stress deducting the critical shear stress; k is unit transformation factor; a, b are empirical coefficients.

Parametric model refers to the establishment of a database by collecting the breach parameters of historical dam failure cases. And the regression analysis is adopted to deduce the parameter equations of the final breach parameters and related characteristics of reservoir capacity, dam height, reservoir water level, etc. The more famous ones are MacDonald equation22, Froehlich equation23,24, Von Thun and Gillete equation25, Xu and Zhang equation26, etc. The regression equations for the above parametric models are as follows:

$$ \left\{ \begin{gathered} V_{eroded} = \left\{ \begin{gathered} 0.0261(V_{out} \cdot h_{w} )^{0.769} {\text{ (for earthfill dams)}} \hfill \\ 0.00348(V_{out} \cdot h_{w} )^{0.852} {\text{ (with clay core or rockfill dams)}} \hfill \\ \end{gathered} \right. \hfill \\ t_{f} = 0.0179(V_{eroded} )^{0.364} \hfill \\ W_{b} = \frac{{V_{eroded} - h_{b}^{2} (CZ_{b} + h_{b} Z_{b} Z_{3} /3)}}{{h_{b} (C + h_{b} Z_{3} /2)}} \hfill \\ \end{gathered} \right.\quad ({\text{MacDonald}}) $$
(5)
$$ \left\{ \begin{gathered} B_{ave} = 0.1803K_{0} V_{w}^{0.32} h_{b}^{0.19} \hfill \\ t_{f} = 0.00254V_{w}^{0.53} h_{b}^{ - 0.90} \hfill \\ \end{gathered} \right.\quad ({\text{Froehlich}},{1995}) $$
(6)
$$ \left\{ \begin{gathered} B_{ave} = 0.27K_{0} V_{w}^{0.32} h_{b}^{0.04} \hfill \\ t_{f} = 63.2\sqrt {\frac{{V_{w} }}{{gh_{b}^{2} }}} \hfill \\ \end{gathered} \right.\quad ({\text{Froehlich}},{2}00{8}) $$
(7)
$$ \left\{ \begin{gathered} B_{ave} = 2.5h_{w} + C_{b} \hfill \\ t_{f} = \left\{ \begin{gathered} \frac{{B_{ave} }}{{4_{{h_{w} }} }}{\text{ (erosion resistant)}} \hfill \\ \frac{{B_{ave} }}{{4_{{h_{w} }} + 61.0}}{\text{ (easily erodible)}} \hfill \\ \end{gathered} \right. \hfill \\ \end{gathered} \right.\quad ({\text{Von Thun and Gillete}}) $$
(8)
$$ \left\{ \begin{gathered} \frac{{B_{ave} }}{{h_{b} }} = 0.787\left( {\frac{{h_{d} }}{{h_{r} }}} \right)^{0.133} \left( {\frac{{V_{w}^{0.32} }}{{h_{w} }}} \right)^{0.652} e^{{B_{3} }} \hfill \\ \frac{{B_{t} }}{{h_{b} }} = 1.062\left( {\frac{{h_{d} }}{{h_{r} }}} \right)^{0.092} \left( {\frac{{V_{w}^{1/3} }}{{h_{w} }}} \right)^{0.508} e^{{B_{2} }} \hfill \\ \frac{{t_{f} }}{{t_{r} }} = 0.304\left( {\frac{{h_{d} }}{{h_{r} }}} \right)^{0.707} \left( {\frac{{V_{w}^{1/3} }}{{h_{w} }}} \right)^{1.228} e^{{B_{5} }} \hfill \\ \end{gathered} \right.\quad ({\text{Xu and Zhang}}) $$
(9)

where Veroded is volume of material eroded from the embankment dam; Vout is volume of water that passes through the breach; hw is water depth above the dam breach bottom; tf is breach formation time; Wb is bottom width of the breach; C is crest width of the dam; Z3 = Z1 + Z2; Z1 is average slope of the upstream face of dam; Z2 is average slope of the downstream face of dam; Bave is average breach width; K0 is constant (1.4 for overtopping failures, 1.0 for piping); Vw is reservoir volume above the breach bottom at time of failure; hb is final breach height; g is gravitational acceleration; Cb is a reservoir size coefficient; hd is height of the dam; hr is reference dam height taken as 15 m; Bt is breach top width; tr is 1 h (unit duration time);B2, B3, B5 are coefficients representing function of dam properties.

The parametric model often lacks sufficient theoretical basis, and the mechanism model often has applicability problems because the physical mechanism of water and sediment balance of dam breach has not been completely studied. Therefore, there are also semi-empirical models combining mechanism model and parametric model. HEC-RAS presents a parametric breach model in which a headcut erosion process with a trapezoidal breach is determined by estimating the breaching characteristics. The physical description of the breach will consist of the height of the breach, breach width, and side slopes in H:V. These values represent the maximum breach size. A diagram describing the breach defined by HEC-RAS is shown in Fig. 1.

Figure 1
figure 1

Description of breach parameters required from HEC-RAS.

When performing a dam breach analysis, the characteristics of the breach (shown in Fig. 1) must first be estimated using parametric breach models. The breach width is described as the average breach width (Bave) in many equations, while HEC-RAS requires the breach bottom width(Wa) for input. The breach height (hb) is the verticalextent from the top of the dam to the average invert elevation of the breach. Many publications and equations also use the height of the water (hw), which is the vertical extentfrom the maximum water surface to the invert elevation of the breach. The side slopes areexpressed in units of distance horizontal to every one unit in the vertical (H: 1 V). The breach dimensions, as well as the breach formation time must be estimated outside of the HEC-RAS software, and entered into the program. Once the breaching characteristics are estimated, then HEC-RAS can be used to compute the outflow hydrograph from the breach by defining several breach initial and boundary conditions like max possible bottom width, min possible bottom elevation, starting notch width, et.al. As the breaching characteristics could be estimated through all types of breach models, and the calculation accuracy of HEC-RAS has been verified through many example applications11, the HEC-RAS breach model could also be adopted to restore breach processes predicted by various breach models.

Mathematical model of two-dimensional unsteady flow for dam breach flood analysis

Governing equations

The dam breach flood wave movement in the downstream river channel of a reservoir is a non-constant flow. The relationship between hydraulic elements and space and time could be expressed by the two-dimensional equations of non-constant flow, namely the Saint–Venant equations:

$$ \left\{ \begin{gathered} \frac{\partial z}{{\partial t}} + \frac{\partial }{\partial x}(hU) + \frac{\partial }{\partial y}(hV) = 0 \hfill \\ \frac{\partial U}{{\partial t}} + U\frac{\partial U}{{\partial x}} + V\frac{\partial U}{{\partial y}} + g\frac{\partial z}{{\partial x}} + g\frac{{u\sqrt {u^{2} + v^{2} } }}{{c^{2} h}} = v_{t} \left( {\frac{{\partial^{2} u}}{{\partial x^{2} }} + \frac{{\partial^{2} u}}{{\partial y^{2} }}} \right) \hfill \\ \frac{\partial V}{{\partial t}} + U\frac{\partial V}{{\partial x}} + V\frac{\partial V}{{\partial y}} + g\frac{\partial z}{{\partial y}} + g\frac{{v\sqrt {u^{2} + v^{2} } }}{{c^{2} h}} = v_{t} \left( {\frac{{\partial^{2} v}}{{\partial x^{2} }} + \frac{{\partial^{2} v}}{{\partial y^{2} }}} \right) \hfill \\ \end{gathered} \right. $$
(10)

where h is the water depth; U is the x direction velocity; V is the y direction velocity; z is the water level; g is gravitational acceleration; u is the vertical average velocity components in x direction; v is the vertical average velocity components in y direction; vt is the turbulent viscosity coefficient; c is the Chezy coefficient.

Initial conditions

The initial condition for dam-break flood analysis refers to the initial water level of the breach and the calculation region at time t = 0:

$$ \left. h \right|_{t = 0} = h_{0} (x,y,0) $$
(11)
Boundary conditions

The boundary conditions include the land boundary and hydraulic boundary. The land boundary is the boundary where there is no water exchange with the outside region:

$$ \frac{\partial Q}{{\partial x}} = 0,\frac{\partial Q}{{\partial y}} = 0 $$
(12)

The hydraulic boundary is the boundary where there is water exchange with the outside region:

$$ \frac{\partial Q}{{\partial x}} = q_{x} ,\frac{\partial Q}{{\partial y}} = q_{y} $$
(13)

The inflow hydraulic boundary is the water level or flow process line which could be determined and calculated by the overtopping failure model of embankment dam. The outflow boundary could be the water level and flow relationship curve.

Stochastic simulation of overtopping dam breach process and flood routing

According to the general method of flood routing simulation for overtopping failure of embankment dam, its uncertainty factors could be classified into the following three categories: the nondeterministic natural inflow process of the reservoir, the nondeterministic dam breach process and the nondeterministic flood routing process.

The upper boundary condition is partly determined by the inflow process of a reservoir. The uncertainty of inflow process originates from the uncertainty of natural inflow. Although there is obvious uncertainty in the inflow process, the worst flood has already been designed through hydrological analysis considering frequency analysis and adverse combination conditions. The uncertain inflow process of a reservoir will not be considered in the uncertainty analysis. Therefore, the uncertainty of breach flood analysis mainly comes from the dam breach simulation and flood routing.

Since there have been a large number of related studies on the parameter sensitivity of common breach models27, and the uncertainty of model parameters is actually far less than the influence brought by the uncertainty of different breach models themselves28,29, the analysis on breach model uncertainty is focused.

Although different breach mechanisms, different erosion processes and different calculation parameters are adopted in various breach models, the final simulation results of the breach flow process is highly correlated with the following breaching characteristics: the final breach bottom elevation Z, the final breach bottom width b, the breach slope coefficient m, and the breach formation time T. If the general weir flow formula is adopted to calculate the flow, the main uncertainty parameter should be the weir flow coefficient C.

Because the HEC-RAS semi-empirical model could simulate all overtopping breach process by defining the above parameters, it is adopted to restore the calculation results of other breach models, so as to simulate different breach processes and reflect the influence of model uncertainty. The stochastic breach discharge will also be adopted in the downstream flood routing simulation as an upper boundary using HEC-RAS.

Uncertain flood routing simulation method based on stratified sampling Monte Carlo method

The objective of nondeterministic breach flood routing simulation is to transfer all kinds of flood routing uncertainty parameters to the probability results of flood routing simulation through breach flood simulation model. Monte Carlo method could be a possible way. In order to reduce the probability calculation error, it is necessary to make more samples fall into the interval that has an important impact on the simulation results. Ordinary sampling methods could only achieve this by increasing the sampling times, which will significantly increase the computational burden. When the single simulation of flood routing takes up to several hours, accomplishing the above task will become impossible. Thus, the stratified sampling method is proposed to ensure that more samples are taken in the interval with important influence so as to reduce the number of samples required for simulation accuracy.

When the number of samples in the interval meets the following formula, the error of calculation results is minimized:

$$ N_{j} = N\frac{{d_{j} \sigma_{j} }}{{\sum\limits_{j = 1}^{m} {d_{j} \sigma_{j} } }} $$
(14)

where Nj is the number of samples in interval j; N is the total sample number; dj is the length of interval j; σj is the variance of uniformly distributed sampling in interval j.

The uncertain flood routing simulation steps for overtopping failure of embankment dam could be described as follows:

  1. 1.

    The random variables affecting the uncertainty of flood evolution and their distribution is determined;

  2. 2.

    Random variables are stratified sampled and corresponding interval probability distributions are calculated;

  3. 3.

    The stochastic process of overtopping failure of embankment dam is numerically simulated adopting stratified sampled variables using HEC-RAS semi-empirical model;

  4. 4.

    The uncertainty transfer model is constructed (flood routing model);

  5. 5.

    The flood risk map of the corresponding sampling variables is obtained by the transfer model, and the normalized weights are assigned according to the distribution probability of the sampled variables;

  6. 6.

    All the sampled risk map calculation results are superimposed to obtain the uncertainty simulation results of the overtopping breach flood of embankment dam.

Under the development environment of Microsoft Visual Studio 2012 and Intel Visual Fortran 2013, FORTRAN90 was used to program and simulate the stochastic process of overtopping dam breach flood routing by invoking the HEC-RAS command flow batch processing program—HEC-RAS Controller. The automatic dam breach simulation and flood routing analysis were realized by repeatedly invoking HEC-RAS Controller. Finally, the calculation results were coded to be output and summarized by QGIS version 3.2830.

Case study

A reservoir is located in northwest China with a total storage capacity of 56.44 million square meters. The dam is a loam core dam with a crest length of 150 m, crest width of 12.5 m, maximum dam height of 32.0 m, crest elevation of 2147.00 m. Both upstream and downstream use turf slope protection. The typical dam section is shown in Fig. 2. The dam failed in 1972. According to the follow-up research, the peak discharge of dam breach is approximately 14,800 m3/s. The breach formation time is about 1.5 h.

Figure 2
figure 2

Typical dam section.

Calculation model

Breach model and related parameters

The BREACH model, MIKE DB model, IWHR DB model and MacDonald equation, Froehlich equation (1995, 2008), Von Thun and Gillete equation, Xu and Zhang equation mentioned above are adopted in overtopping dam failure simulation. Though MIKE DB model and IWHR DB model could not fully simulate dams with core wall, relative studies show that the soil properties are not the very sensitive parameters. The breach process of embankment dam with core wall could be simulated normally as homogeneous dam by using comprehensive parameters representing cohesive soil properties. By regression analysis according to historical dam failure data, the related parameters are shown in Table 1.

Table 1 Related dam breach parameters.

1D–2D coupled unsteady flow model and related parameters

In this study, HEC-RAS version 6.0 is adopted to simulate 1D–2D coupled unsteady flow.

The reservoir is treated with the linear elevation and storage capacity assumption as a one-dimensional model. The downstream flood routing area is simulated with two-dimensional unsteady flow. The dam is treated as an internal structure boundary between the reservoir and the downstream flood routing area. Topographic elevation data of the flood routing area are obtained from DEM elevation data with 15 m precision. The distribution of Manning roughness coefficient in flood routing area is determined by the land use data provided by GlobeLand. The calculation region is shown in Fig. 3. The roughness distribution map generated by QGIS is shown in Fig. 4. The roughness coefficients are shown in Table 2.

Figure 3
figure 3

Unsteady flow simulation region.

Figure 4
figure 4

Roughness distribution map30.

Table 2 Topography roughness assignment in flood routing area11.

Boundary conditions

In order to highlight the impact result of uncertainty, the calculation condition is set as follows: when the water level in front of the dam is the flood control level of 2138.57 m and the checked flood occurs, the spillway fails and cannot discharge water normally. The dam break initiates as soon as the reservoir pool elevation reaches dam crest elevation of 2147.00 m. The simulation duration was 24 h including the flood peak.

Deterministic dam breach simulation results and discussions

The beginning time of dam breach is defined as time 0. The breach discharge processes of all selected breach models are shown in Figs. 5, 6, 7 and 8. The characteristic values of discharge processes are shown in Table 3.

Figure 5
figure 5

Breach discharge of three commonly used mechanism models.

Figure 6
figure 6

Bottom elevation erosion process of three commonly used mechanism models.

Figure 7
figure 7

Bottom width erosion process of three commonly used mechanism models.

Figure 8
figure 8

Breach discharge of five commonly used parametric models.

Table 3 Characteristic values of discharge processes.

According to the calculation results, the erosion processes offered by 3 mechanism models are different. IWHR DB addresses the fastest lateral erosion rate while BREACH has the fastest vertical erosion rate. IWHR DB model tends to first carry out lateral erosion at a fast rate, and then spread vertically. BREACH model occurs sudden acceleration in vertical erosion during slow lateral erosion. The lateral and vertical erosion processes of MIKE DB model are relatively gentle. As a result, MIKE DB model has the smallest peak flow and latest peak flow arrival time.

There are also significant differences between the breach processes offered by 5 parametric models. The results simulated by Xu and Zhang Equations show the longest breach development time and relatively low peak discharge. The results simulated by Von Thun & Gillete Equations show the shortest breach development time and highest peak discharge. The results simulated by Froehlich equations (1995) show the earliest peak discharge arrival time. The results simulated by MacDonald Equations show the latest peak discharge arrival time. The factors of dam breach process in each model are significantly different.

The peak flow and peak arrival time predicted by different models are quite different. The relative mean error of peak flow is up to 7.64% for mechanism models and could reach 20.67% for parametric models. The difference in development time and peak flow arrival time could be more than double. The model uncertainty is significant.

By adjusting the parameter values within a reasonable range and collecting statistics of their impact on the peak breach discharge values, a parameter sensitivity analysis is carried out. The sensitivity percentage and ranking of breach model parameters are shown in Table 5.

The results show that the most sensitive parameters are soil porosity, lateral erosion coefficient and erosion rate (l/b) respectively in BREACH, MIKE DB and IWHR DB models whose sensitivity percentages are all higher than 40%. It could be noted that most sensitive parameters could be controlled in a limited range through site and laboratory test like soil porosity, nonuniform coefficient, internal friction angle, dam slope, et. al. A few parameters have unclear value ranges, like the erosion coefficient in MIKE DB and IWHR DB model. This is a flaw in the model because it is difficult to determine the appropriate value unless there is measured data for calibration. In general, the uncertainty of different models could generally be controlled by the limitation of parameters ranges. The influence of the uncertainty of the breach model is much greater than that of the parameter uncertainty.

Nondeterministic overtopping dam breach flood routing simulation

Stochastic variables and statistics

According to the breach calculation results above, the stochastic variables and their ranges could be generally determined according to Table 4. According to statistics of dam failure events, the final breach bottom elevation usually occurs at 1/3 of the dam height above the dam foundation22,24,26. And when the breach bottom elevation is low enough, it is usually not a sensitive parameter as the breach peak flow has occurred before the breach reaches its bottom. Therefore, the final breach bottom elevation is taken as 2125.00–2115.00 m. The broad crested weir formula is used for the open breach. The weir flow coefficient through the breach varies from 1.3 to 1.7 according to relevant studies13.

Table 4 Breach calculation factors of five commonly used parametric models.

It is assumed that the random variables are independent and normally distributed. According to sensitivity analysis, while considering the adverse impact on security, a large mean square error is adopted for stochastic variables with a large impact on uncertainty and the symmetry axis is biased towards the adverse value. The ranges of parameters that control the breach process are determined according to the parametric model results shown in Table 5. The ranges of roughness coefficients (Manning’s n) are determined according to roughness for natural rivers11. The random variables used in the nondeterministic simulation and their statistics are shown in Table 6.

Table 5 Sensitivity ranking of breach model parameters.
Table 6 Stochastic variables and statistics.

Random simulation results of overtopping breach of embankment dam

For the highly sensitive breach bottom elevation and breach development time, five layers of sampling are equally divided to ensure that each interval contains samples. The remaining variables are sampled according to their normal probability distribution with truncation, and a total of 50 groups are sampled. The HEC-RAS semi-empirical overtopping breach model is adopted for stochastic simulation. The results are shown in Figs. 9, 10 and Table 7.

Figure 9
figure 9

Probability distribution of random discharge process of overtopping breach of embankment dam.

Figure 10
figure 10

Occurrence frequency (probability) curve of flood peak discharge during overtopping breach of embankment dam.

Table 7 Results features of random discharge process of overtopping breach of embankment dam.

According to the calculation results of random discharge process, the probability of 90% calculated flood peak discharge will not exceed 28.99% of the median peak discharge value. The probability of 80% calculated flood peak discharge will not exceed 15.63% of the median peak discharge value. The lowest peak discharge obtained randomly can also reach about 70% of the median peak discharge value. Therefore, the random discharge process predicted by random overtopping dam breach models is relatively stable. In the extreme case, the peak flow exceeds the median one by 50% (probability: 2%).

Random simulation results of flood routing

The stochastic flood routing is carried out by adopting the random dam breach discharge process as the upper boundary condition. The random simulated flood routing results are weighted and superimposed according to the sampling probability to obtain the uncertain flood routing simulation results. The results maps are generated by QGIS and are shown in Fig. 11. Results features of stochastic overtopping dam breach flood routing are shown in Table 8.

Figure 11
figure 11

Probability distribution map of inundated area due to dam breach30.

Table 8 Results features of stochastic overtopping dam breach flood routing.

According to the calculation results of stochastic flood routing simulation, during the first hour of flood routing, the flood routing length could vary from 10.2 to 19.4 km. There is only 50% probability allowing the simulated inundated area to reach about 64.6% of the maximum possible inundated area. Only 37.9% of the maximum possible inundated area and 58.9% of the maximum possible inundation length could be reached under the probability of 90%. The minimum inundated area, which is the inevitable inundated range with occurrence frequency of 100%, could only reach 31.6% of the corresponding maximum inundated area and 52.7% of the corresponding maximum inundation length. The results indicate that the uncertainty of flood routing within a few kilometers downstream of the dam is more significant than areas far from the dam.

An hour later, the water moved farther downstream. The minimum inundated area with occurrence frequency of 100% could reach 65% of the corresponding maximum inundated area in each breach period. There is 90% probability allowing the inundated area to reach about 70% of the maximum possible inundated area. At a median frequency of 50%, close to 80% of the maximum possible inundation range could be obtained. Therefore, the simulation results of flood evolution and inundation are relatively controllable within a reasonable range of parameter values. The stability and reliability of the flood routing simulation results could be guaranteed.

In general, though parameters have been controlled in a limited range, the flood routing results in the early stage of dam overtopping failure present greater uncertainty. As the flood progresses further downstream, the uncertainty will gradually decrease. When making flood risk maps and emergency plans, applying conservative value of flood routing simulation parameters will not significantly increase the flood inundation areas far from the dam, and will not cause too much unnecessary waste and loss in emergency scheduling. Therefore, when simulating flood routing for areas far from the dam, it is recommended adopting conservative parameter values. When simulating flood routing for areas near the dam (within about 15 km), adopting appropriate breach models and regression analysis could play an important role in ensuring the accuracy of the results.

Conclusions

In this paper, an uncertainty analysis on the reliability of flood simulation of overtopping breach of embankment dam is carried out from two aspects: the uncertainty of overtopping dam break and the uncertainty of flood routing. The conclusions could be made as follows:

  1. 1.

    The uncertainty factors in the simulation of overtopping outburst flood of embankment dam mainly come from the uncertain inflow process of reservoir, the uncertain breach process of dam and the uncertain flood routing process. Among them, the uncertain inflow process could be studied and reduced by using conservative frequency analysis value and combined condition strategy. The uncertain breach process of dam is studied by presenting a sensitive study between 3 mechanism breach models and 5 parametric breach models.

  2. 2.

    According to the case study results, IWHR DB addresses the fastest lateral erosion rate while BREACH has the fastest vertical erosion rate. IWHR DB model tends to first carry out lateral erosion at a fast rate which is mainly determined by erosion rate (l/b), and then spread vertically. BREACH model occurs sudden acceleration in vertical erosion when carrying out slow lateral erosion. The lateral and vertical erosion processes of MIKE DB model are relatively gentle. As a result, MIKE DB model has the smallest peak flow and latest peak flow arrival time.

There are also significant differences between the breach processes offered by 5 parametric models. The results simulated by Xu and Zhang Equations show the longest breach development time and relatively low peak discharge. The results simulated by Von Thun and Gillete Equations show the shortest breach development time and highest peak discharge. The results simulated by Froehlich equations (1995) show the earliest peak discharge arrival time. The results simulated by MacDonald Equations show the latest peak discharge arrival time. The factors of dam breach process in each model are significantly different.

The peak flow and peak arrival time predicted by different models are quite different. The relative mean error of peak flow is up to 7.64% for mechanism models and could reach 20.67% for parametric models. The difference in development time and peak flow arrival time could be more than double. The model uncertainty is significant.

The most sensitive parameters are soil porosity, lateral erosion coefficient and erosion rate (l/b) respectively in BREACH, MIKE DB and IWHR DB models. It could be noted that most sensitive parameters could be controlled in a limited range through site and laboratory test like soil porosity, nonuniform coefficient, internal friction angle, dam slope, et. al. A few parameters have unclear value ranges, like the erosion coefficient in MIKE DB and IWHR DB model. This is a flaw in the model because it is difficult to determine the appropriate value unless there is measured data for calibration. In general, the uncertainty of different models could generally be controlled by the limitation of parameters ranges. The influence of the uncertainty of the breach model is much greater than that of the parameter uncertainty.

In general, in the process of nondeterministic dam breach, when the parameters are within a reasonable value range, the influence of model uncertainty on the development and discharge process of dam breach is much higher than that of their respective parameters.

  1. 3.

    By coupling the uncertainty dam breach model with the calculation and analysis method of dam breach flood routing, an uncertainty analysis method for flood routing of overtopping breach of embankment dam is proposed based on stratified sampling Monte Carlo method. The stochastic dam breach process is simulated by HEC-RAS semi-empirical dam breach model. And the flood routing is simulated through HEC-RAS 1D-2D coupled unsteady flow analysis. According to the case study results, though parameters have been controlled in a limited range, the flood routing results in the early stage of dam overtopping failure present greater uncertainty. As the flood progresses further downstream, the uncertainty will gradually decrease. When making flood risk maps and emergency plans, applying conservative value of flood routing simulation parameters will not significantly increase the flood inundation areas far from the dam, and will not cause too much unnecessary waste and loss in emergency scheduling. Therefore, when simulating flood routing for areas far from the dam, it is recommended adopting conservative parameter values. When simulating flood routing for areas near the dam (within about 15 km), adopting appropriate breach models and regression analysis could play an important role in ensuring the accuracy of the results.

  2. 4.

    In this paper, the dam type is embankment dam. Since the breach mechanism and breach model of different dam types are different, corresponding uncertainty analysis and research could be further studied for other dam types on the basis of this paper.