Developing flood vulnerability curve for rice crop using remote sensing and hydrodynamic modeling

Vempi Satriya Adi Hendrawan, Daisuke Komori

Research output: Contribution to journalArticlepeer-review

26 Citations (Scopus)


The use of flood damage functions, or vulnerability curves, as a relationship between the intensity of the process (hazard) and the degree of potential loss of the exposed elements plays an important role in flood risk assessment. In terms of disaster risk reduction, a vulnerability curve is a helpful tool to quickly evaluate loss and conduct immediate decision making. This study proposes flood vulnerability curves for rice crop using crop yield loss estimated by crop statistics and remote-sensing modeling as a loss indicator. Flood parameters (depth, velocity, and duration) were simulated using a hydrodynamic model. Thus, the degree of crop yield loss and flood characteristics could be compared to derive vulnerability curves. In this study, we used a case study of the 2007 flood in the Solo river basin of Indonesia. Our results show that the relationship between the intensity of flood parameters and the degree of rice crop yield loss fits logarithmic regression functions, where water depth is considered the most significant parameter in loss estimation. Moreover, the minimum values of water depth, flow velocity, and duration relationship, that induce loss are 0.2 m, 0.03 m/s, and 8 days, respectively, while the maximum values, that induce complete yield loss, are 5.2 m, 0.08 m/s, and 22 days. This study's framework can be potentially used to obtain flood vulnerability curve or flood damage function, particularly for data-scarce regions.

Original languageEnglish
Article number102058
JournalInternational Journal of Disaster Risk Reduction
Publication statusPublished - 2021 Feb 15


  • Crop yield loss
  • Flood
  • Remote sensing
  • Submergence
  • Vulnerability curve


Dive into the research topics of 'Developing flood vulnerability curve for rice crop using remote sensing and hydrodynamic modeling'. Together they form a unique fingerprint.

Cite this