Intrinsic groundwater vulnerability determination at the aquifer scale: a methodology coupling travel time estimation and rating methods |
| |
Authors: | Vassilios?Pisinaras Christos?Polychronis Email author" target="_blank">Alexandra?GemitziEmail author |
| |
Affiliation: | 1.Department of Environmental Engineering, Faculty of Engineering,Democritus University of Thrace,Xanthi,Greece;2.Laboratory of Atmospheric Pollution and of Pollution Control Engineering, Department of Environmental Engineering, Faculty of Engineering,Democritus University of Thrace,Xanthi,Greece |
| |
Abstract: | Groundwater vulnerability has been subject of much research due to the valuable information it provides concerning groundwater protection and exploitation potential. Up to now, most groundwater vulnerability studies adopt subjective systems of rating the various factors and subsequently, their results are often ambiguous and contradicting. Within the present study a methodology for the estimation of intrinsic groundwater vulnerability at the aquifer scale is presented. The methodology is based on travel time estimation from specified sources of pollution to the aquifer. Besides the deterministic calculation of travel times, the methodology provides a rating system for each pollution source, based on its relative severity and the estimated threat that it poses to the aquifer. Therefore, it can be regarded as a hybrid method that couples the advantages provided by the physically based methods with those of the subjective rating systems. The methodology is applied to the Neon Sidirochorion aquifer, Northeastern Greece, an overexploited aquifer where river waters, sea waters and lake waters interact, causing groundwater quality deterioration to the aquifer. The results indicated that the proposed groundwater vulnerability assessment methodology is well capturing pollution related to saltwater intrusion and agricultural activities, while it is concluded that the conceptual model is significantly affecting the vulnerability assessment results and therefore has to be previously developed. |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |
|