Critical Design Value Estimation and Its Applications
نویسنده
چکیده
The air quality design value is the mathematically determined pollutant concentration at a particular site that must be reduced to, or maintained at or below the National Ambient Air Quality Standards (NAAQS) in order to assure attainment. The design value may be calculated based on ambient measurements observed at a local monitor in a 3-year period or on model estimates. The design value, however, varies from year to year due to both the pollutant emissions and natural variability such as meteorological conditions, wildfires, dust storms, volcanic activities etc. In order to investigate certain policy options related to pollution controls it would be desirable to estimate a critical design value above which the NAAQS is likely to be violated with a certain probability. In this paper, a statistical technique has been developed to estimate a critical design value that is based on the average design value and its variability in the past. The critical design value could be used as a planning tool for regulatory agencies because it is an indicator of the likelihood of future violations of the NAAQS given the current average design value and its variability. The approach is general and could be applied to estimate the critical design value for any pollutant. As an example, eleven years (1989-1999) of PM10 data nationwide were extracted from the US EPA AIRS database to estimate the PM10 critical design values. The analyses indicate that PM10 design values in the West have much larger inter-annual variability than those in the East as reflected in their much lower critical design values. This, in turn, suggests that the interannual variability in meteorology, wildfires, and dust storms may have played a more significant role in the West, and also this larger variability could be partly explained by the once every six days sampling schedule at most PM10 monitoring sites.
منابع مشابه
Selection of Appropriate Estimation Methods of Range Conditions (Case Study: Kabirkooh Rangelands of Zagros, Iran)
The range conditions explain its health as a management tool. Obviously, theimplementation of this important assessment requires the most appropriate study methodfor each region. In order to select the most appropriate methods of range conditions inKabirkooh grasslands of Zagros in Iran, five estimation methods (i.e. six-factor, fourfactor,vegetation and soil combination, value of pasture and c...
متن کاملDesign, Modeling, and Construction of a New Tactile Sensor for Measuring Contact-Force
This paper presents the design, modeling, and testing of a flexible tactile sensor and its applications. This sensor is made of polymer materials and can detect the 2D surface texture image and contact-force estimation. The sensing mechanism is based on the novel contact deflection effect of a membrane. We measure the deflection of the membrane with measuring the strain in the membrane with emb...
متن کاملMechanical Properties Analysis of Bilayer Euler-Bernoulli Beams Based on Elasticity Theory
This paper analyzes the effects of structures and loads on the static bending and free vibration problems of bilayer beams. Based on static mechanical equilibrium and energy equilibrium, the static and dynamic governing equations of bilayer beam are established. It is found that the value of the thickness ratio has a significant effect on the static and dynamic responses of the beam, and the st...
متن کاملEstimation of Project Performance Using Earned Value Management and Fuzzy Regression
Earned Value Management is a critical project managementmethodology that evaluates project performance from cost andschedule viewpoints. The novel theoretical framework presented in thispaper estimates future performance of project regarding the past relativeinformation. It benefits from fuzzy regression (FR) models in estimationprocess in order to deal with the vagueness and impreciseness ofre...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001