Validation of vulnerability mapping methods by field investigations and numerical modelling
Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source a...
Gespeichert in:
Veröffentlicht in: | Hydrogeology journal 2008-06, Vol.16 (4), p.641-658 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 658 |
---|---|
container_issue | 4 |
container_start_page | 641 |
container_title | Hydrogeology journal |
container_volume | 16 |
creator | Neukum, Christoph Hötzl, Heinz Himmelsbach, Thomas |
description | Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making. |
doi_str_mv | 10.1007/s10040-007-0249-y |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_34624190</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>34624190</sourcerecordid><originalsourceid>FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</originalsourceid><addsrcrecordid>eNqFkUtLxDAUhYsoOI7-AFcGF-6qefWRpQy-YMCFjhsXIW3SmqFNatIO9N-bTgXBhW5yz-I7J_dyougcwWsEYXbjw0thHGQMMWXxeBAtECVJDFGSHe41ijHK6HF04v0WBhplZBG9v4lGS9Fra4CtwG5ojHKi0I3uR9CKrtOmBq3qP6z0oBhBpVUjgTY75Xtd730eCCOBGVrldCka0Fqpmib4TqOjSjRenX3PZbS5v3tdPcbr54en1e06FhTTPqYpgwkkWBa5ZIjRVARNKaFpjknGGE4Uk5SVuVRFVSQqpZXKq1KUhBEIJSbL6GrO7Zz9HMJivNW-DDsIo-zgeUjCFDH4L4hh-D_Zg5e_wK0dnAlHcIxQghjGE4RmqHTWe6cq3jndCjdyBPlUCp9L4ZOcSuFj8ODZ4wNrauV-gv8yXcymSlguaqc937xgiML1DOahWPIF96CY7Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>211519220</pqid></control><display><type>article</type><title>Validation of vulnerability mapping methods by field investigations and numerical modelling</title><source>SpringerLink Journals - AutoHoldings</source><creator>Neukum, Christoph ; Hötzl, Heinz ; Himmelsbach, Thomas</creator><creatorcontrib>Neukum, Christoph ; Hötzl, Heinz ; Himmelsbach, Thomas</creatorcontrib><description>Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.</description><identifier>ISSN: 1431-2174</identifier><identifier>EISSN: 1435-0157</identifier><identifier>DOI: 10.1007/s10040-007-0249-y</identifier><language>eng</language><publisher>Berlin/Heidelberg: Berlin/Heidelberg : Springer-Verlag</publisher><subject>Aeration zone ; Aquatic Pollution ; Contaminants ; Earth and Environmental Science ; Earth Sciences ; Field tests ; Geological engineering ; Geology ; Geophysics/Geodesy ; Groundwater ; Groundwater management ; Groundwater protection ; Hydrogeology ; Hydrology/Water Resources ; Karst ; Land use ; Land use planning ; Legislation ; Mapping ; Vulnerability mapping ; Waste Water Technology ; Water Management ; Water Pollution Control ; Water Quality/Water Pollution</subject><ispartof>Hydrogeology journal, 2008-06, Vol.16 (4), p.641-658</ispartof><rights>Springer-Verlag 2007</rights><rights>Springer-Verlag 2008</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</citedby><cites>FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10040-007-0249-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10040-007-0249-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,41487,42556,51318</link.rule.ids></links><search><creatorcontrib>Neukum, Christoph</creatorcontrib><creatorcontrib>Hötzl, Heinz</creatorcontrib><creatorcontrib>Himmelsbach, Thomas</creatorcontrib><title>Validation of vulnerability mapping methods by field investigations and numerical modelling</title><title>Hydrogeology journal</title><addtitle>Hydrogeol J</addtitle><description>Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.</description><subject>Aeration zone</subject><subject>Aquatic Pollution</subject><subject>Contaminants</subject><subject>Earth and Environmental Science</subject><subject>Earth Sciences</subject><subject>Field tests</subject><subject>Geological engineering</subject><subject>Geology</subject><subject>Geophysics/Geodesy</subject><subject>Groundwater</subject><subject>Groundwater management</subject><subject>Groundwater protection</subject><subject>Hydrogeology</subject><subject>Hydrology/Water Resources</subject><subject>Karst</subject><subject>Land use</subject><subject>Land use planning</subject><subject>Legislation</subject><subject>Mapping</subject><subject>Vulnerability mapping</subject><subject>Waste Water Technology</subject><subject>Water Management</subject><subject>Water Pollution Control</subject><subject>Water Quality/Water Pollution</subject><issn>1431-2174</issn><issn>1435-0157</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqFkUtLxDAUhYsoOI7-AFcGF-6qefWRpQy-YMCFjhsXIW3SmqFNatIO9N-bTgXBhW5yz-I7J_dyougcwWsEYXbjw0thHGQMMWXxeBAtECVJDFGSHe41ijHK6HF04v0WBhplZBG9v4lGS9Fra4CtwG5ojHKi0I3uR9CKrtOmBq3qP6z0oBhBpVUjgTY75Xtd730eCCOBGVrldCka0Fqpmib4TqOjSjRenX3PZbS5v3tdPcbr54en1e06FhTTPqYpgwkkWBa5ZIjRVARNKaFpjknGGE4Uk5SVuVRFVSQqpZXKq1KUhBEIJSbL6GrO7Zz9HMJivNW-DDsIo-zgeUjCFDH4L4hh-D_Zg5e_wK0dnAlHcIxQghjGE4RmqHTWe6cq3jndCjdyBPlUCp9L4ZOcSuFj8ODZ4wNrauV-gv8yXcymSlguaqc937xgiML1DOahWPIF96CY7Q</recordid><startdate>20080601</startdate><enddate>20080601</enddate><creator>Neukum, Christoph</creator><creator>Hötzl, Heinz</creator><creator>Himmelsbach, Thomas</creator><general>Berlin/Heidelberg : Springer-Verlag</general><general>Springer-Verlag</general><general>Springer Nature B.V</general><scope>FBQ</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QH</scope><scope>7ST</scope><scope>7TG</scope><scope>7UA</scope><scope>7XB</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>BKSAR</scope><scope>C1K</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>F1W</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>H96</scope><scope>HCIFZ</scope><scope>KL.</scope><scope>KR7</scope><scope>L.G</scope><scope>L6V</scope><scope>M2P</scope><scope>M7S</scope><scope>PATMY</scope><scope>PCBAR</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>Q9U</scope><scope>SOI</scope><scope>7TV</scope><scope>7U6</scope></search><sort><creationdate>20080601</creationdate><title>Validation of vulnerability mapping methods by field investigations and numerical modelling</title><author>Neukum, Christoph ; Hötzl, Heinz ; Himmelsbach, Thomas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a424t-46905032db8d91946a32d4434682379925e9d49c8debfb5e64fe8fcac39300d23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Aeration zone</topic><topic>Aquatic Pollution</topic><topic>Contaminants</topic><topic>Earth and Environmental Science</topic><topic>Earth Sciences</topic><topic>Field tests</topic><topic>Geological engineering</topic><topic>Geology</topic><topic>Geophysics/Geodesy</topic><topic>Groundwater</topic><topic>Groundwater management</topic><topic>Groundwater protection</topic><topic>Hydrogeology</topic><topic>Hydrology/Water Resources</topic><topic>Karst</topic><topic>Land use</topic><topic>Land use planning</topic><topic>Legislation</topic><topic>Mapping</topic><topic>Vulnerability mapping</topic><topic>Waste Water Technology</topic><topic>Water Management</topic><topic>Water Pollution Control</topic><topic>Water Quality/Water Pollution</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Neukum, Christoph</creatorcontrib><creatorcontrib>Hötzl, Heinz</creatorcontrib><creatorcontrib>Himmelsbach, Thomas</creatorcontrib><collection>AGRIS</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Aqualine</collection><collection>Environment Abstracts</collection><collection>Meteorological & Geoastrophysical Abstracts</collection><collection>Water Resources Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Earth, Atmospheric & Aquatic Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy & Non-Living Resources</collection><collection>SciTech Premium Collection</collection><collection>Meteorological & Geoastrophysical Abstracts - Academic</collection><collection>Civil Engineering Abstracts</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) Professional</collection><collection>ProQuest Engineering Collection</collection><collection>Science Database</collection><collection>Engineering Database</collection><collection>Environmental Science Database</collection><collection>Earth, Atmospheric & Aquatic Science Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>ProQuest Central Basic</collection><collection>Environment Abstracts</collection><collection>Pollution Abstracts</collection><collection>Sustainability Science Abstracts</collection><jtitle>Hydrogeology journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Neukum, Christoph</au><au>Hötzl, Heinz</au><au>Himmelsbach, Thomas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Validation of vulnerability mapping methods by field investigations and numerical modelling</atitle><jtitle>Hydrogeology journal</jtitle><stitle>Hydrogeol J</stitle><date>2008-06-01</date><risdate>2008</risdate><volume>16</volume><issue>4</issue><spage>641</spage><epage>658</epage><pages>641-658</pages><issn>1431-2174</issn><eissn>1435-0157</eissn><abstract>Vulnerability maps illustrate the potential threat of contaminants to groundwater and can be considered as important tools for land-use planning and related legislation. For karst areas with characteristic preferential infiltration conditions, vulnerability maps are also excellent tools for source and resource protection. However, the resulting qualitative maps are often inconsistent and even contradictive and thus might lead to inconclusive vulnerability assessments. The results of a validation of vulnerability maps produced using four different methods, DRASTIC, GLA, PI and EPIK, are reported for a karst area in southwest Germany. By means of measured hydraulic and transport parameters of the geological sequence, numerical simulations were used based on a conceptual model for the area under study. The mean transit time through the unsaturated zone (resource protection) was used as the validation parameter. The study demonstrates that the highest level of accuracy is achieved with the GLA- and PI methods. Both DRASTIC and EPIK are not able to incorporate highly variable distributions and thickness of cover sediments and their protective properties in the respective mapping procedure. Thus, vulnerability maps produced with DRASTIC, EPIK, and related methods should be used with care when employed in vulnerability assessments for land use planning and related decision-making.</abstract><cop>Berlin/Heidelberg</cop><pub>Berlin/Heidelberg : Springer-Verlag</pub><doi>10.1007/s10040-007-0249-y</doi><tpages>18</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1431-2174 |
ispartof | Hydrogeology journal, 2008-06, Vol.16 (4), p.641-658 |
issn | 1431-2174 1435-0157 |
language | eng |
recordid | cdi_proquest_miscellaneous_34624190 |
source | SpringerLink Journals - AutoHoldings |
subjects | Aeration zone Aquatic Pollution Contaminants Earth and Environmental Science Earth Sciences Field tests Geological engineering Geology Geophysics/Geodesy Groundwater Groundwater management Groundwater protection Hydrogeology Hydrology/Water Resources Karst Land use Land use planning Legislation Mapping Vulnerability mapping Waste Water Technology Water Management Water Pollution Control Water Quality/Water Pollution |
title | Validation of vulnerability mapping methods by field investigations and numerical modelling |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T09%3A48%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Validation%20of%20vulnerability%20mapping%20methods%20by%20field%20investigations%20and%20numerical%20modelling&rft.jtitle=Hydrogeology%20journal&rft.au=Neukum,%20Christoph&rft.date=2008-06-01&rft.volume=16&rft.issue=4&rft.spage=641&rft.epage=658&rft.pages=641-658&rft.issn=1431-2174&rft.eissn=1435-0157&rft_id=info:doi/10.1007/s10040-007-0249-y&rft_dat=%3Cproquest_cross%3E34624190%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=211519220&rft_id=info:pmid/&rfr_iscdi=true |