1 / 15

Colorado River Water Resources Vulnerability

Colorado River Water Resources Vulnerability. Project for Hill Country Conservancy Daniel Zavala Araiza. - Outline -. Outline. Hill Country Conservancy Defining vulnerability Mapping vulnerability Methodology Results Conclusions. - Hill Country Conservancy -.

coby
Download Presentation

Colorado River Water Resources Vulnerability

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Colorado River Water Resources Vulnerability Project for Hill Country Conservancy Daniel Zavala Araiza

  2. - Outline - Outline • Hill Country Conservancy • Defining vulnerability • Mapping vulnerability • Methodology • Results • Conclusions

  3. - Hill Country Conservancy - • Land preservation agreements. • Conserve a property in its natural state. • Land conservation -> impact on aquifer system.

  4. - Objective - Development of a tool that is useful in determining which parts or parcels of land are more valuable in terms water resources vulnerability to focus on their preservation. Yildirim, M., and Topkaya B., (2007), Groundwater Protection: A Comparative Study of Four Vulnerability Mapping Methods. Clean 35 (6), 594 – 600.

  5. - Defining Vulnerability - Intrinsic geological + hydro geological characteristics which determine sensibility of groundwater/surface water to contamination. intrinsic vs. specific • Point sources (oil spills, leakage) • Risk mapping • All kinds of pollutants • Vulnerability mapping

  6. - Mapping Vulnerability - Yildirim, M., and Topkaya B., (2007), Groundwater Protection: A Comparative Study of Four Vulnerability Mapping Methods. Clean 35 (6), 594 – 600.

  7. - Selected Parameters - Soil thickness Soil KSAT + + + + steep high thin How much filtration? Amount of water that can be absorbed. How easily water flows through the soil. *ranking based on amount of ground cover - - - - low flat thick Slope Vegetation How likely water is to runoff? How much water will be impeded by vegetative cover?

  8. - Creating layers - Soil thickness Soil KSAT Weighted sum SSURGO Vulnerability map HCC study area NED (USGS) Slope Reclassify *raster Vegetation NLC (USGS) *raster

  9. - Soil Datasets - • Soil Survey Geographic Database (SSURGO) Soil Data Viewer for ArcMap Soil Survey Geographic Data Base Data Use Information, USDA, 1995,pp.110

  10. - Layers - KSAT Soil Thickness Vegetation Slope

  11. - Results -

  12. - Results - Hickory Aquifer Edwards Aquifer

  13. - Further work - • Add Cave Density as parameter. • Compare groundwater to surface water vulnerability • Sensibility analysis for relative importance of parameters in weighted sum.

  14. - Conclusions - • Vulnerability mapping as a valuable tool. • Couple their use with other methods (risk mapping). • Importance of parameters selected and their weight.

More Related