Abstract
This paper reports on a conceptual model that was developed to describe the different groundwater discharge 'types' from the Table Mountain Group (TMG) aquifer, that contributes to the different components of the flow regime in each of the recognised river reaches for streams and rivers associated with the TMG. This model integrates hydrogeological, ecological and geomorphological understandings into an ecohydrological perspective linking ground- and surface water systems. Through geospatial intersections of existing GIS layers a GIS model was also developed to highlight the quaternary catchments containing sensitive aquatic ecosystems that could be vulnerable to groundwater use from the TMG. The conceptual model demonstrates the intimate link between groundwater from the TMG aquifer and aquatic ecosystems in the mountain and foothill reaches of streams and rivers in the Cape Folded Mountains in particular. It also identifies two primary zones of interaction between groundwater and surface water in the TMG, namely, the 'TMG aquifer daylight-domain', located in the recharge zone, and the 'TMG aquifer surface water interface-domain', located at the discharge end of the aquifer. The conceptual model clearly indicates the difference between real groundwater, and perceived groundwater contributions to streamflow in the TMG. It is the lower flows of the flow regime that will be most vulnerable to groundwater use from the TMG aquifer in the 'TMG aquifer daylight-domain', which are unfortunately also the most important flows from an ecological perspective. However, any groundwater use from the TMG aquifer will also affect the discharge end of the aquifer, located far from the higher elevation recharge areas, or the point of groundwater abstraction, in lowland settings in the 'TMG aquifer surface water interface-domain'. The GIS model integrated the conceptual understanding into a management tool by highlight all quaternary catchments associated with TMG containing sensitive aquatic ecosystems and gave the variable vulnerability for each.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.