Optimization of the Sefid-Roud Dam desiltation process using a sophisticated one-dimensional numerical model

Ali KHOSRONEJAD

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

Although water and soil conservation activities reduce reservoir sedimentation, it is inevitable that reservoirs fed by rivers transporting high amounts of sediment will experience sedimentation. The Ghezel-Ozan and Shah-Roud rivers, which flow to the Sefid-Roud reservoir dam, are both highly sediment-laden and transport significant amounts of sediment in both bed load and suspended load forms to the reservoir. Hence, it seems that the only practical way to remove the sediment from the reservoir is to flush it out using the Chasse method. In the present paper, field measurements of Chasse operation characteristics taken in previous years are presented, and a numerical model that simulates this process is introduced. After calibrating the model using field measured data, the calculated results (for reservoir pressure flushing and released sediment volume) of the numerical model were compared with other measured data for the same Chasse operation and the results agree well. Finally, using the numerical simulation results, the best approaches to ensure highly effective flushing while conserving reservoir water are presented (at least for the Sefid-Roud dam). The operation of the bottom outlet gates, the shape of the output hydrograph, and the reservoir water level variation during flushing were optimized. In addition, the numerical model and related parameters, which need to be calibrated, are discussed.

Original languageEnglish (US)
Pages (from-to)189-200
Number of pages12
JournalInternational Journal of Sediment Research
Volume24
Issue number2
DOIs
StatePublished - Jun 2009
Externally publishedYes

Keywords

  • Bottom outlet
  • Chasse operation
  • Numerical model
  • Pressure flushing
  • Reservoir water level

Fingerprint

Dive into the research topics of 'Optimization of the Sefid-Roud Dam desiltation process using a sophisticated one-dimensional numerical model'. Together they form a unique fingerprint.

Cite this