Vulnerability Evaluation of Groundwater of N’Djamena City: Contribution of the Parametric Methods GOD and SI
Autor: | Yaya Mahmout, David Deubalbe, Djimako Bongo, Edith Kadjangaba, Sabine Djimouko, Jean Claude Doumnang Mbaigane |
---|---|
Rok vydání: | 2021 |
Předmět: | |
Zdroj: | Journal of Environmental Protection. 12:472-489 |
ISSN: | 2152-2219 2152-2197 |
DOI: | 10.4236/jep.2021.127030 |
Popis: | The purpose of this work is to study the vulnerability of the Quaternary aquifer that lies beneath the N’Djamena city Chad. The subsoil of N’Djamena city Chad is made up of a multilayered aquifer in which there are two main aquifers located respectively at a depth of about 10 and 60 m, between the two there is an intermediate aquifer at about 30 m depth. It is this latter water table, generally captured by human-powered pumps, that is the subject of this study. Because of anarchic garbage dumping, wastewater discharge, latrines scattered throughout the city, chemical fertilizers and herbicides used on the banks of Chari River and its tributary the Logone for market gardening, the quality of the water in this aquifer is highly threatened. Moreover, it has been noting that the sources of pollution are constantly increasing in conjunction with the growth of the population, so the knowledge and protection of groundwater are necessary. We have therefore carried out a study of intrinsic vulnerability using two mapping methods (GOD and SI), as mapping is recognized as an effective tool for decision support in the case of safeguarding water resources. The results obtained by the GOD method show that 38% of the study area is covered by high vulnerability, 29% by moderate vulnerability, 21% by low vulnerability and 21% by the very low vulnerability. With the SI method, 54% of the study area is covering by low vulnerability and 46% by the low and moderate vulnerability. The coincidence rate of low nitrate values in groundwater with areas of very low and low vulnerability is 91% and 76% for the GOD and SI methods, respectively. Although these observations validated the different maps obtained, the SI approach seems to be the most adequate for vulnerability tracing in our study area. |
Databáze: | OpenAIRE |
Externí odkaz: |