Turn off MathJax
Article Contents
Current Status and Prospects of Calculation Methods for Dam and Dike Failures (Ⅱ): Two-Dimensional and Three-Dimensional Mathematical Models[J]. Bulletin of Geological Science and Technology. doi: 10.19509/j.cnki.dzkq.tb20250303
Citation: Current Status and Prospects of Calculation Methods for Dam and Dike Failures (Ⅱ): Two-Dimensional and Three-Dimensional Mathematical Models[J]. Bulletin of Geological Science and Technology. doi: 10.19509/j.cnki.dzkq.tb20250303

Current Status and Prospects of Calculation Methods for Dam and Dike Failures (Ⅱ): Two-Dimensional and Three-Dimensional Mathematical Models

doi: 10.19509/j.cnki.dzkq.tb20250303
  • Received Date: 30 Jun 2025
    Available Online: 24 Nov 2025
  • [Objective] Dam and dike failures, as one of the most frequent disaster events worldwide, have a profound impact on human production and daily life. Research on breach calculation methods is crucial for the assessment, prediction, and risk prevention of dam-break and dike-break floods. [Analysis] From a mathematical modeling perspective, this paper reviews and summarizes two-dimensional (2D) and three-dimensional (3D) computational models for breach development. The characteristics of common 2D and 3D mathematical models are outlined, and a comparative table of typical breach calculation methods is provided. Three representative 2D mathematical models are briefly introduced to facilitate comparative studies among researchers and to better understand the current development of dam-breach mathematical models. Furthermore, commonly used numerical computation techniques, commercial software, and open-source tools are summarized and compared. The current applications and future prospects of machine learning methods in breach modeling are also discussed, along with suggestions for future research directions and key priorities. [Conclusion] Overall, existing studies on breach development mechanisms and numerical simulations still involve many simplifications and assumptions. Both 2D and 3D numerical methods are evolving toward more refined descriptions of breach development processes, but they require significant computational resources and time. Accurate and efficient full-process simulation of breach evolution is expected to remain an active research topic. Machine learning methods have gradually been introduced into breach development prediction and analysis, and they are expected to play an increasingly important and in-depth role in future research.

     

  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article Views(7) PDF Downloads(0) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return