The scheme presents the methodological framework for flood event management DSSs (Van der Vat et al, 2007). The framework consists of several modules. The external driver module describes the existing situation prior to the flood and the boundary conditions for the flood event. The tools module consists of the tools used in the other modules. The management response module describes the management options available to the decision maker. The analysis is described in the modules in the central column.
The methodology also
applies for long term flood risk management. The Task 18 report (McGahey
et al, unpublished) shows the methodological framework applied for long
term flood risk management. In relation to the DSS in this pilot study, a similar type of DSS in the Thames Pilot has been also developed. The DSS is known as the Flood INcident Tactical and Operational Framework (FLINTOF).
Example of a breach scenario in the DSS
In the current example the breach location ‘Rilland’ has been selected. The location is shown by a red dot with a name tag (Figure 1). The background map shows a topographical map of a part of Zeeland. The maximum water-depth map is shown on top of the topographical map. The maximum water depth is highest close to the breach location. Figure 2 is an Example of an ESS map showing the maximum water depth for each postal code zone Figure 3 shows the time of inundation. The red area gets flooded within 2 hours after breach initiation.