Colorado river water resources vulnerability
This presentation is the property of its rightful owner.
Sponsored Links
1 / 15

Colorado River Water Resources Vulnerability PowerPoint PPT Presentation


  • 56 Views
  • Uploaded on
  • Presentation posted in: General

Colorado River Water Resources Vulnerability. Project for Hill Country Conservancy Daniel Zavala Araiza. - Outline -. Outline. Hill Country Conservancy Defining vulnerability Mapping vulnerability Methodology Results Conclusions. - Hill Country Conservancy -.

Download Presentation

Colorado River Water Resources Vulnerability

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Colorado river water resources vulnerability

Colorado River Water Resources Vulnerability

Project for Hill Country Conservancy

Daniel Zavala Araiza


Outline

- Outline -

Outline

  • Hill Country Conservancy

  • Defining vulnerability

  • Mapping vulnerability

  • Methodology

  • Results

  • Conclusions


Colorado river water resources vulnerability

- Hill Country Conservancy -

  • Land preservation agreements.

  • Conserve a property in its natural state.

  • Land conservation -> impact on aquifer system.


Colorado river water resources vulnerability

- Objective -

Development of a tool that is useful in determining which parts or parcels of land are more valuable in terms water resources vulnerability to focus on their preservation.

Yildirim, M., and Topkaya B., (2007), Groundwater Protection: A Comparative Study of Four Vulnerability Mapping Methods. Clean 35 (6), 594 – 600.


Colorado river water resources vulnerability

- Defining Vulnerability -

Intrinsic geological + hydro geological characteristics which determine sensibility of groundwater/surface water to contamination.

intrinsic vs. specific

  • Point sources (oil spills, leakage)

  • Risk mapping

  • All kinds of pollutants

  • Vulnerability mapping


Colorado river water resources vulnerability

- Mapping Vulnerability -

Yildirim, M., and Topkaya B., (2007), Groundwater Protection: A Comparative Study of Four Vulnerability Mapping Methods. Clean 35 (6), 594 – 600.


Colorado river water resources vulnerability

- Selected Parameters -

Soil thickness

Soil KSAT

+

+

+

+

steep

high

thin

How much filtration?

Amount of water that can be absorbed.

How easily water flows through the soil.

*ranking based on amount of ground cover

-

-

-

-

low

flat

thick

Slope

Vegetation

How likely water is to runoff?

How much water will be impeded by vegetative cover?


Colorado river water resources vulnerability

- Creating layers -

Soil thickness

Soil KSAT

Weighted sum

SSURGO

Vulnerability map

HCC study area

NED

(USGS)

Slope

Reclassify

*raster

Vegetation

NLC

(USGS)

*raster


Colorado river water resources vulnerability

- Soil Datasets -

  • Soil Survey Geographic Database (SSURGO)

Soil Data Viewer for ArcMap

Soil Survey Geographic Data Base Data Use Information, USDA, 1995,pp.110


Colorado river water resources vulnerability

- Layers -

KSAT

Soil Thickness

Vegetation

Slope


Colorado river water resources vulnerability

- Results -


Colorado river water resources vulnerability

- Results -

Hickory Aquifer

Edwards Aquifer


Colorado river water resources vulnerability

- Further work -

  • Add Cave Density as parameter.

  • Compare groundwater to surface water vulnerability

  • Sensibility analysis for relative importance of parameters in weighted sum.


Colorado river water resources vulnerability

- Conclusions -

  • Vulnerability mapping as a valuable tool.

  • Couple their use with other methods (risk mapping).

  • Importance of parameters selected and their weight.


  • Login