Dissemin is shutting down on January 1st, 2025

Published in

American Geophysical Union, Water Resources Research, 3(44), 2008

DOI: 10.1029/2007wr006277

Links

Tools

Export citation

Search in Google Scholar

Intrinsic vulnerability assessment in karst areas : a numerical modeling approach

Journal article published in 2008 by Christoph Butscher ORCID, Peter Huggenberger
This paper is made freely available by the publisher.
This paper is made freely available by the publisher.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Orange circle
Published version: archiving restricted
Data provided by SHERPA/RoMEO

Abstract

The main objective of this study was to quantify the intrinsic vulnerability of karst springs by numerical modeling. A global approach is used, modeling the discharge of a karst spring. This approach includes the hydrological dynamics of karst systems and is applicable to complex karst settings, where structural and hydraulic characteristics cannot be spatially resolved with sufficient accuracy. A basis model and four extended versions were set up to determine the individual characteristics of the present karst system and to include different flow processes that could affect the vulnerability of the system. All these model setups consider, besides recharge ( soil and epikarst system), the conduit and the diffuse flow system as the main characteristics of the karst aquifer. The extended setups additionally account for surface runoff, an intermediate flow system, exchange flow between the conduit and the diffuse system and seasonal variation in the water storage capacity of the recharge system. Potential use of the calibrated models to quantify the intrinsic vulnerability of karst springs is discussed on the basis of ( 1) the temporally changing contributions of the conduit and diffuse flow systems to spring discharge, and ( 2) modeled breakthrough curves resulting from a standardized contaminant input into the karst system. The modeling approach complements vulnerability mapping methods by addressing temporal and quantitative aspects of vulnerability.