A storm surge inundation model of the northern Bay of Bengal using publicly available data

Matt Lewis, Paul Bates, Kevin Horsburgh, Jeffrey C Neal, Guy Schumann

Research output: Contribution to journalArticle (Academic Journal)

71 Citations (Scopus)

Abstract

A computationally inexpensive inundation model has been developed from freely available data sources for the northern Bay of Bengal region to estimate flood risk from storm surges. This is the first time Shuttle Radar Topography Mission (SRTM) terrain data have been used in a dynamic coastal inundation model. To reduce SRTM noise, and the impact of vegetation artefacts on the ground elevation, the SRTM data were up-scaled from their native 90 m resolution to 900 m. A sub-grid routine allowed estuary channels with widths less than this resolution to be simulated efficiently, and allowed six major river flows to be represented. The inundation model was forced with an IIT-D model hindcast of the 2007 cyclone Sidr flood event, using parameters from two cyclone databases (IBTrACs and UNISYS). Validation showed inundation prediction accuracy with a root mean squared error (RMSE) on predicted water level of ∼ 2 m, which was of the same order of magnitude as the forcing water-level uncertainties. Therefore, SRTM and other publicly available data can be useful for coastal flood risk management in data-poor regions, although the associated uncertainty needs to be expressed to end users. Better SRTM processing techniques may improve inundation model performance, and future work should also seek to improve storm tide uncertainties in this region. Copyright © 2012 Royal Meteorological Society
Original languageEnglish
Pages (from-to)358-369
Number of pages12
JournalQuarterly Journal of the Royal Meteorological Society
Volume139
Issue number671
DOIs
Publication statusPublished - 2013

Keywords

  • SRTM, IIT-D, cyclone Sidr, storm surge, inundation

Fingerprint Dive into the research topics of 'A storm surge inundation model of the northern Bay of Bengal using publicly available data'. Together they form a unique fingerprint.

  • Cite this