Validation of vulnerability mapping methods by field investigations and numerical modelling

Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Hydrogeology journal 2008-06, Vol.16 (4), p.641-658
Hauptverfasser: Neukum, Christoph, Hötzl, Heinz, Himmelsbach, Thomas
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 658
container_issue 4
container_start_page 641
container_title Hydrogeology journal
container_volume 16
creator Neukum, Christoph
Hötzl, Heinz
Himmelsbach, Thomas
description Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.
doi_str_mv 10.1007/s10040-007-0249-y
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_34624190</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>34624190</sourcerecordid><originalsourceid>FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</originalsourceid><addsrcrecordid>eNqFkUtLxDAUhYsoOI7-AFcGF-6qefWRpQy-YMCFjhsXIW3SmqFNatIO9N-bTgXBhW5yz-I7J_dyougcwWsEYXbjw0thHGQMMWXxeBAtECVJDFGSHe41ijHK6HF04v0WBhplZBG9v4lGS9Fra4CtwG5ojHKi0I3uR9CKrtOmBq3qP6z0oBhBpVUjgTY75Xtd730eCCOBGVrldCka0Fqpmib4TqOjSjRenX3PZbS5v3tdPcbr54en1e06FhTTPqYpgwkkWBa5ZIjRVARNKaFpjknGGE4Uk5SVuVRFVSQqpZXKq1KUhBEIJSbL6GrO7Zz9HMJivNW-DDsIo-zgeUjCFDH4L4hh-D_Zg5e_wK0dnAlHcIxQghjGE4RmqHTWe6cq3jndCjdyBPlUCp9L4ZOcSuFj8ODZ4wNrauV-gv8yXcymSlguaqc937xgiML1DOahWPIF96CY7Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>211519220</pqid></control><display><type>article</type><title>Validation of vulnerability mapping methods by field investigations and numerical modelling</title><source>SpringerLink Journals - AutoHoldings</source><creator>Neukum, Christoph ; Hötzl, Heinz ; Himmelsbach, Thomas</creator><creatorcontrib>Neukum, Christoph ; Hötzl, Heinz ; Himmelsbach, Thomas</creatorcontrib><description>Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.</description><identifier>ISSN: 1431-2174</identifier><identifier>EISSN: 1435-0157</identifier><identifier>DOI: 10.1007/s10040-007-0249-y</identifier><language>eng</language><publisher>Berlin/Heidelberg: Berlin/Heidelberg : Springer-Verlag</publisher><subject>Aeration zone ; Aquatic Pollution ; Contaminants ; Earth and Environmental Science ; Earth Sciences ; Field tests ; Geological engineering ; Geology ; Geophysics/Geodesy ; Groundwater ; Groundwater management ; Groundwater protection ; Hydrogeology ; Hydrology/Water Resources ; Karst ; Land use ; Land use planning ; Legislation ; Mapping ; Vulnerability mapping ; Waste Water Technology ; Water Management ; Water Pollution Control ; Water Quality/Water Pollution</subject><ispartof>Hydrogeology journal, 2008-06, Vol.16 (4), p.641-658</ispartof><rights>Springer-Verlag 2007</rights><rights>Springer-Verlag 2008</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</citedby><cites>FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10040-007-0249-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10040-007-0249-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,41487,42556,51318</link.rule.ids></links><search><creatorcontrib>Neukum, Christoph</creatorcontrib><creatorcontrib>Hötzl, Heinz</creatorcontrib><creatorcontrib>Himmelsbach, Thomas</creatorcontrib><title>Validation of vulnerability mapping methods by field investigations and numerical modelling</title><title>Hydrogeology journal</title><addtitle>Hydrogeol J</addtitle><description>Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.</description><subject>Aeration zone</subject><subject>Aquatic Pollution</subject><subject>Contaminants</subject><subject>Earth and Environmental Science</subject><subject>Earth Sciences</subject><subject>Field tests</subject><subject>Geological engineering</subject><subject>Geology</subject><subject>Geophysics/Geodesy</subject><subject>Groundwater</subject><subject>Groundwater management</subject><subject>Groundwater protection</subject><subject>Hydrogeology</subject><subject>Hydrology/Water Resources</subject><subject>Karst</subject><subject>Land use</subject><subject>Land use planning</subject><subject>Legislation</subject><subject>Mapping</subject><subject>Vulnerability mapping</subject><subject>Waste Water Technology</subject><subject>Water Management</subject><subject>Water Pollution Control</subject><subject>Water Quality/Water Pollution</subject><issn>1431-2174</issn><issn>1435-0157</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqFkUtLxDAUhYsoOI7-AFcGF-6qefWRpQy-YMCFjhsXIW3SmqFNatIO9N-bTgXBhW5yz-I7J_dyougcwWsEYXbjw0thHGQMMWXxeBAtECVJDFGSHe41ijHK6HF04v0WBhplZBG9v4lGS9Fra4CtwG5ojHKi0I3uR9CKrtOmBq3qP6z0oBhBpVUjgTY75Xtd730eCCOBGVrldCka0Fqpmib4TqOjSjRenX3PZbS5v3tdPcbr54en1e06FhTTPqYpgwkkWBa5ZIjRVARNKaFpjknGGE4Uk5SVuVRFVSQqpZXKq1KUhBEIJSbL6GrO7Zz9HMJivNW-DDsIo-zgeUjCFDH4L4hh-D_Zg5e_wK0dnAlHcIxQghjGE4RmqHTWe6cq3jndCjdyBPlUCp9L4ZOcSuFj8ODZ4wNrauV-gv8yXcymSlguaqc937xgiML1DOahWPIF96CY7Q</recordid><startdate>20080601</startdate><enddate>20080601</enddate><creator>Neukum, Christoph</creator><creator>Hötzl, Heinz</creator><creator>Himmelsbach, Thomas</creator><general>Berlin/Heidelberg : Springer-Verlag</general><general>Springer-Verlag</general><general>Springer Nature B.V</general><scope>FBQ</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QH</scope><scope>7ST</scope><scope>7TG</scope><scope>7UA</scope><scope>7XB</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>BKSAR</scope><scope>C1K</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>F1W</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>H96</scope><scope>HCIFZ</scope><scope>KL.</scope><scope>KR7</scope><scope>L.G</scope><scope>L6V</scope><scope>M2P</scope><scope>M7S</scope><scope>PATMY</scope><scope>PCBAR</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>Q9U</scope><scope>SOI</scope><scope>7TV</scope><scope>7U6</scope></search><sort><creationdate>20080601</creationdate><title>Validation of vulnerability mapping methods by field investigations and numerical modelling</title><author>Neukum, Christoph ; Hötzl, Heinz ; Himmelsbach, Thomas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Aeration zone</topic><topic>Aquatic Pollution</topic><topic>Contaminants</topic><topic>Earth and Environmental Science</topic><topic>Earth Sciences</topic><topic>Field tests</topic><topic>Geological engineering</topic><topic>Geology</topic><topic>Geophysics/Geodesy</topic><topic>Groundwater</topic><topic>Groundwater management</topic><topic>Groundwater protection</topic><topic>Hydrogeology</topic><topic>Hydrology/Water Resources</topic><topic>Karst</topic><topic>Land use</topic><topic>Land use planning</topic><topic>Legislation</topic><topic>Mapping</topic><topic>Vulnerability mapping</topic><topic>Waste Water Technology</topic><topic>Water Management</topic><topic>Water Pollution Control</topic><topic>Water Quality/Water Pollution</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Neukum, Christoph</creatorcontrib><creatorcontrib>Hötzl, Heinz</creatorcontrib><creatorcontrib>Himmelsbach, Thomas</creatorcontrib><collection>AGRIS</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Aqualine</collection><collection>Environment Abstracts</collection><collection>Meteorological &amp; Geoastrophysical Abstracts</collection><collection>Water Resources Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Agricultural &amp; Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Earth, Atmospheric &amp; Aquatic Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy &amp; Non-Living Resources</collection><collection>SciTech Premium Collection</collection><collection>Meteorological &amp; Geoastrophysical Abstracts - Academic</collection><collection>Civil Engineering Abstracts</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) Professional</collection><collection>ProQuest Engineering Collection</collection><collection>Science Database</collection><collection>Engineering Database</collection><collection>Environmental Science Database</collection><collection>Earth, Atmospheric &amp; Aquatic Science Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>ProQuest Central Basic</collection><collection>Environment Abstracts</collection><collection>Pollution Abstracts</collection><collection>Sustainability Science Abstracts</collection><jtitle>Hydrogeology journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Neukum, Christoph</au><au>Hötzl, Heinz</au><au>Himmelsbach, Thomas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Validation of vulnerability mapping methods by field investigations and numerical modelling</atitle><jtitle>Hydrogeology journal</jtitle><stitle>Hydrogeol J</stitle><date>2008-06-01</date><risdate>2008</risdate><volume>16</volume><issue>4</issue><spage>641</spage><epage>658</epage><pages>641-658</pages><issn>1431-2174</issn><eissn>1435-0157</eissn><abstract>Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.</abstract><cop>Berlin/Heidelberg</cop><pub>Berlin/Heidelberg : Springer-Verlag</pub><doi>10.1007/s10040-007-0249-y</doi><tpages>18</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1431-2174
ispartof Hydrogeology journal, 2008-06, Vol.16 (4), p.641-658
issn 1431-2174
1435-0157
language eng
recordid cdi_proquest_miscellaneous_34624190
source SpringerLink Journals - AutoHoldings
subjects Aeration zone
Aquatic Pollution
Contaminants
Earth and Environmental Science
Earth Sciences
Field tests
Geological engineering
Geology
Geophysics/Geodesy
Groundwater
Groundwater management
Groundwater protection
Hydrogeology
Hydrology/Water Resources
Karst
Land use
Land use planning
Legislation
Mapping
Vulnerability mapping
Waste Water Technology
Water Management
Water Pollution Control
Water Quality/Water Pollution
title Validation of vulnerability mapping methods by field investigations and numerical modelling
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T09%3A48%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Validation%20of%20vulnerability%20mapping%20methods%20by%20field%20investigations%20and%20numerical%20modelling&rft.jtitle=Hydrogeology%20journal&rft.au=Neukum,%20Christoph&rft.date=2008-06-01&rft.volume=16&rft.issue=4&rft.spage=641&rft.epage=658&rft.pages=641-658&rft.issn=1431-2174&rft.eissn=1435-0157&rft_id=info:doi/10.1007/s10040-007-0249-y&rft_dat=%3Cproquest_cross%3E34624190%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=211519220&rft_id=info:pmid/&rfr_iscdi=true