• No results found

Karstic aquifer vulnerability assessment methods and results at a test site (Apulia, southern Italy)

N/A
N/A
Protected

Academic year: 2020

Share "Karstic aquifer vulnerability assessment methods and results at a test site (Apulia, southern Italy)"

Copied!
10
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1. Geological scheme of the Apulian region Legend: 1) recentclastic cover (Pliocene-Pleistocene), 2) bioclastic carbonate rocks(Paleogene) and calcarenites (Miocene), 3) scarp and basin chert-carbonate rocks (upper Jurassic-Cretaceous), 4) carbonate platformrocks (upper Jurassic-Cretaceous).
Table 1. Methods and used parameters for the groundwater vulnerability assessment.
Fig. 2. Geological map of the test site Legend: 1) Cave, 2) Do-line/Sinkhole, 3) Drainage pattern, 4) Limit of areas, indicated byhachure, discharging outside the karst region, 5) Fault, 6) Piezo-metric countur line (m a.s.l.), 7) Road, 8) Urban area, 9) Alluvialdeposits (Midlle and Upper Pleistocene-Olocene), 10) Carbonatesuccessions of the Cretaceous formations (the Calcare of AltamuraFormation – Late Turonian-Maastrichtian and the Calcare of BariFormation – Valanginian-Lower Turonian).
Table 2. Statistics of spatial values of morphological, climate and hydrogeological parameters in the test site
+4

References

Related documents

The degree of resistance exhibited after 1, 10 and 20 subcultures in broth in the absence of strepto- mycin was tested by comparing the number of colonies which grew from the

We incorporated equations in BDDs directly, without encodings. The resulting objects are called EQ- BDDs. A straightforward notion of ordered EQ-BDDs is dened, and it is proved

Although the impact of marketing and/or operations capability on a firm’s financial performance has been studied (e.g. Song et al., 2005; Terjesena et al., 2011; Nath et al.,

Header (name, address, etc.) back so it’s no longer visible. 2)Fold the employment section of your resume back so it too is no longer visible. 3)What you have left is your 30

The screening was done for the following TTN mu- tations associated with HMERF: p.Gly30150Asp identified in the current study, p.Cys30071Arg recently identified in North

As more businesses adopt cloud-based email security and archiving services, the impetus will be on cloud service providers to operate with total transparency regarding the

Contego’s NAC-as-a-Service is a proven, enterprise-class solution that addresses many security risks for customers—from employee and guest access control, to real-time

The Workflow Management Coalition (WfMC), having the definition of business process, has defined workflow as “The automation of a business process, in whole or part, during which