Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo

Dspace KHENCHELA

  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Khelifi Afaf"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Cartographie de la vulnérabilité des eaux souterraines à la pollution cas de la nappe d’El Mahmel –Khenchela
    (Université Abbes Laghrour -Khenchela-, 2017) Khelifi Afaf; Ounissi Oussama
    Vulnerability maps of aquifers are useful tools for contributing to the protection of groundwater resources against possible pollution. The purpose of this study is to determine the intrinsic vulnerability of el mahmel alluvial aquifer using the GOD model. The parameters studied are Type of aquifer (G) type of aquifer in terms of lithological factors (O), depth of the aquifer (D). The results obtained show four vulnerability classes ranging from very low to high. 1.23% of the study area is characterized by "very low" vulnerability and is located around the TZ5 well, 51.5% of the study area is characterized by low vulnerability, Moderate vulnerability class occupies 44 , 9% of the study area and a high vulnerability class occupies 2.35% of the study area and coincides with Sebkhat ouled Ammara in the north. A geographic information system was used for indexing and overlying different layer and creating the final vulnerability map.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback