Validation of vulnerability mapping methods by field investigations and numerical modelling

Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Hydrogeology journal 2008-06, Vol.16 (4), p.641-658
Hauptverfasser: Neukum, Christoph, Hötzl, Heinz, Himmelsbach, Thomas
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.
ISSN:1431-2174
1435-0157
DOI:10.1007/s10040-007-0249-y