Government Technology

Locating Drinking Water Under Challenging Conditions



Drill Here
Drill Here

January 28, 2009 By

Photo: Local residents watch as Jill Bruning (seated) tests a pumping location in central Nicaragua.

Volcanic ground is a challenging place to drill water wells. In central Nicaragua, situated on volcanic bedrock, only 3 of every 10 wells drilled produce sufficient water for even one household.

That's because, in volcanic rock, groundwater flows primarily through fracture zones that can't be seen on the earth's surface. Locating those underground fractures can improve the well-drilling success rate dramatically. But up to now, there has been virtually no funding for groundwater exploration and little research into using remote sensors such as satellite images to identify the location of subsurface faults and fractures.

As part of a larger, National Science Foundation-funded research project titled "Remote Sensing for Hazards Mitigation and Resource Protection in Latin America," a Michigan Technological University graduate student in geological and mining engineering and sciences designed a map using remote sensing images to locate underground fractures.

Jill Bruning, who recently received her Master's degree from Michigan Tech; faculty advisor John Gierke, an associate professor of geological and mining engineering and sciences; and other students then took the map to Nicaragua for field testing. The goal of their research was to determine which data-processing tools work best with various types of remotely sensed images, field observations and other data to create an effective, efficient method for identifying the best places to drill in challenging terrain.

Bruning's research asked and answered three questions:

o What type of image or combination of image types will best detect lineaments, which are surface characteristics that reveal subsurface structures?

o What processing and interpretation techniques enhance the surface appearance that indicates fracturing below ground?

o How do lineaments identified from remotely sensed images compare to field observations?

She used several kinds of satellite images and several data-processing techniques, overlaying the results to find areas of coincidence between lineament interpretations from the different images. In addition to developing the method, Bruning determined that RADARSAT-1 products are superior to other types of satellite images because they maximize the topographic or surface features of the ground.

No single type of satellite image identified all the lineaments in the final map. However, says Bruning, the method of employing images from multiple sensors is a low-cost, non-invasive way to improve groundwater exploration in remote and geologically challenging areas.


| More

You May Also Like

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Redefining Citizen Engagement in a Mobile-First World
Today’s consumers are embracing the ease and convenience of anytime, anywhere access to the Internet from their mobile devices. In order for government and public sector organizations to fully engage with their citizens and provide similar service quality as their consumer counterparts, the time is now to shift to mobile citizen engagement. Learn more
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
View All

Featured Papers