Assessment of Groundwater Vulnerability to Pollution using DRASTIC Model and Fuzzy Logic in Herat City, Afghanistan
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 10
Abstract
Groundwater (GW) vulnerability maps have become a standard tool for protecting groundwater resources from pollution because, from one hand groundwater represents the main source of drinking water, and on the other hand high concentrations of human activities such industrial, agricultural, and household represent real or potential sources of groundwater contamination. The main objective of this study is to assess the groundwater vulnerable zones in Herat city, which is the second fastest growing big city in Afghanistan, using the DRASTIC model and fuzzy logic. DRASTIC is based on the seven data layers i.e. Depth of water, net Recharge, Aquifer media, Soil media, Topography, Impact of vadose zone and hydraulic Conductivity that provide the input to the modeling. The study shows that 51% of the city’s groundwater is under highly vulnerable to water pollution. Validation of model showed that vulnerability map which integrated by kriging interpolated layers has better accuracy than inverse distance weighing (IDW) method. The study suggests, that the proposed model can be an effective tool for local authorities who are responsible for managing groundwater resources especially in Afghanistan and assigning rating value of DRASTIC parameters using inference system of fuzzy logic.
Authors and Affiliations
Nasir Ahmad Gesim, Takeo Okazaki
Personalized E-Learning Recommender System using Multimedia Data
Due to the huge amounts of online learning materials, e-learning environments are becoming very popular as means of delivering lectures. One of the most common e-learning challenges is how to recommend quality learning m...
Enhancing Gray Scale Images for Face Detection under Unstable Lighting Condition
Facial expression plays a vital role in no verbal communication between human beings. The brain, in a quarter of second, can determine the state of mind and the behaviour of a person using different traits in a stable li...
Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment
The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resu...
A Survey on User Interfaces for Interaction with Human and Machines
Interaction with the machines and computers is achieved using user interfaces. Nowadays, with the tremendous growth of technology, the interaction is made more simple and flexible. The study of user interfaces for human-...
A Multi-Criteria Decision Method in the DBSCAN Algorithm for Better Clustering
This paper presents a solution based on the unsupervised classification for the multiple-criteria analysis problems of data, where the characteristics and the number of clusters are not predefined, and the objects of dat...