2008
DOI: 10.1029/2007wr006277
|View full text |Cite
|
Sign up to set email alerts
|

Intrinsic vulnerability assessment in karst areas: A numerical modeling approach

Abstract: [1] The main objective of this study was to quantify the intrinsic vulnerability of karst springs by numerical modeling. A global approach is used, modeling the discharge of a karst spring. This approach includes the hydrological dynamics of karst systems and is applicable to complex karst settings, where structural and hydraulic characteristics cannot be spatially resolved with sufficient accuracy. A basis model and four extended versions were set up to determine the individual characteristics of the present … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
60
0
7

Year Published

2009
2009
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 78 publications
(71 citation statements)
references
References 29 publications
1
60
0
7
Order By: Relevance
“…While many studies identify N and DOC as source of contamination in karst systems (Einsiedl et al, 2005;Jost et al, 2010;Katz et al, 2001Katz et al, , 2004Tissier et al, 2013) or provide static vulnerability maps (Andreo et al, 2008;Doerfliger et al, 1999), only very few studies use models to quantify the temporal behaviour of a contamination through the systems (Butscher and Huggenberger, 2008). Some studies use N and DOC to better understand karst processes (Charlier et al, 2012;Mahler and Garner, 2009;Pinault et al, 2001) or for advanced karst model calibration (Hartmann et al, 2013b(Hartmann et al, , 2014b, but to our knowledge there are no applications of such approaches to quantify the drainage processes of N and DOC, and particularly so after strong impacts on ecosystems (e.g.…”
Section: A Hartmann Et Al: Model-aided Quantification Of Dissolved mentioning
confidence: 99%
“…While many studies identify N and DOC as source of contamination in karst systems (Einsiedl et al, 2005;Jost et al, 2010;Katz et al, 2001Katz et al, , 2004Tissier et al, 2013) or provide static vulnerability maps (Andreo et al, 2008;Doerfliger et al, 1999), only very few studies use models to quantify the temporal behaviour of a contamination through the systems (Butscher and Huggenberger, 2008). Some studies use N and DOC to better understand karst processes (Charlier et al, 2012;Mahler and Garner, 2009;Pinault et al, 2001) or for advanced karst model calibration (Hartmann et al, 2013b(Hartmann et al, , 2014b, but to our knowledge there are no applications of such approaches to quantify the drainage processes of N and DOC, and particularly so after strong impacts on ecosystems (e.g.…”
Section: A Hartmann Et Al: Model-aided Quantification Of Dissolved mentioning
confidence: 99%
“…Other structures also exist: Hartmann et al (2012) tested two lower reservoirs in series, while Arfib and Charlier (2016) added a third reservoir. These models were used to discuss the regional karst groundwater resources (Bakalowicz, 2005;Fleury et al, 2009;Ladouche et al, 2014), as a tool for the identification and quantification of flow (Fleury et al, 2007), to assess the vulnerability (Butscher and Huggenberger, 2008), to estimate the groundwater balance (Jukić and Denić-Jukić, 2009), or for flood hazard (Fleury et al, 2013). The main advantage of lumped models is that they can run even if the observed discharge time series is not complete, which is one of the main limitations of time series analysis.…”
Section: Introductionmentioning
confidence: 99%
“…The numerical modeling approach chosen here has recently been proposed by the authors (13). It considers karst groundwater vulnerability to be a dynamic response to variable precipitation and evaporation conditions.…”
Section: Karst Groundwater Vulnerabilitymentioning
confidence: 99%
“…The quantification is based on (1) the vulnerability index VI, representing varying relative contributions of the conduit and diffuse flow system to spring discharge, and (2) the modeled vulnerability concentration C V in spring water resulting from a standardized contaminant input into the system. VI is calculated to quantify the "conduit flow vulnerability" to short-lived contaminants (e.g., fecal bacteria), whereas C V is calculated to quantify the "diffuse flow vulnerability" to persistent contaminants such as pesticides (13,16).…”
Section: Example From Switzerlandmentioning
confidence: 99%
See 1 more Smart Citation