The hygroscopic property of particulate matter (PM) influencing light scattering and absorption is vital for determining visibility and accurate sensing of PM using a low-cost sensor. In this study, we examined the hygroscopic properties of coarse PM (CPM) and fine PM (FPM; PM) and the effects of their interactions with weather factors on visibility. A censored regression model was built to investigate the relationships between CPM and PM concentrations and weather observations. Based on the observed and modeled visibility, we computed the optical hygroscopic growth factor, [Formula: see text], and the hygroscopic mass growth, [Formula: see text], which were applied to PM field measurement using a low-cost PM sensor in two different regions. The results revealed that the CPM and PM concentrations negatively affect visibility according to the weather type, with substantial modulation of the interaction between the relative humidity (RH) and PM. The modeled [Formula: see text] agreed well with the observed [Formula: see text] in the RH range of the haze and mist. Finally, the RH-adjusted PM concentrations based on the visibility-derived hygroscopic mass growth showed the accuracy of the low-cost PM sensor improved. These findings demonstrate that in addition to visibility prediction, relationships between PMs and meteorological variables influence light scattering PM sensing.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8361198 | PMC |
http://dx.doi.org/10.1038/s41598-021-95834-6 | DOI Listing |
Langmuir
January 2025
Department of Chemical Engineering, Indian Institute of Technology, Guwahati 781039, Assam, India.
Self-organized contact line instabilities (CLI) of a macroscopic liquid crystal (LC) droplet can be an ingenious pathway to generate a large collection of miniaturized LC drops. For example, when a larger drop of volatile solvent (e.g.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Psychology, Bryn Mawr College, Bryn Mawr, PA, USA.
Persuasion plays a crucial role in human communication. Yet, convincing someone to change their mind is often challenging. Here, we demonstrate that a subtle linguistic device, generic-you (i.
View Article and Find Full Text PDFMath Ann
July 2024
Department of Mathematics, Virginia Tech, Blacksburg, VA 24061 USA.
In this paper we show that if a compact set , , has Hausdorff dimension greater than when or when , then the set of congruence class of simplices with vertices in has nonempty interior. By set of congruence class of simplices with vertices in we mean where . This result improves the previous best results in the sense that we now can obtain a Hausdorff dimension threshold which allow us to guarantee that the set of congruence class of triangles formed by triples of points of has nonempty interior when as well as extending to all simplices.
View Article and Find Full Text PDFPLoS One
January 2025
Department of Basic Sciences, Preparatory Year, King Faisal University, Al-Ahsa, Saudi Arabia.
Our study presents a novel orbit with s-convexity, for illustration of the behavior shift in the fractals. We provide a theorem to demonstrate the escape criterion for transcendental cosine functions of the type Tα,β(u) = cos(um)+αu + β, for [Formula: see text] and m ≥ 2. We also demonstrate the impact of the parameters on the formatted fractals with numerical examples and graphical illustrations using the MATHEMATICA software, algorithm, and colormap.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Hyderabad, 500078, India.
The motivation for this article stems from the fact that medical image security is crucial for maintaining patient confidentiality and protecting against unauthorized access or manipulation. This paper presents a novel encryption technique that integrates the Deep Convolutional Generative Adversarial Networks (DCGAN) and Virtual Planet Domain (VPD) approach to enhance the protection of medical images. The method uses a Deep Learning (DL) framework to generate a decoy image, which forms the basis for generating encryption keys using a timestamp, nonce, and 1-D Exponential Chebyshev map (1-DEC).
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!