Search results
1 – 10 of over 21000Ying Yang, Wei Wu, Xuequn Cheng, Jinbin Zhao, Baijie Zhaoal and Xiaogang Li
This study aims to develops a new-type low-alloy corrosion resistant steel containing Sb and investigate the corrosion mechanism of this new-type low-alloy steel.
Abstract
Purpose
This study aims to develops a new-type low-alloy corrosion resistant steel containing Sb and investigate the corrosion mechanism of this new-type low-alloy steel.
Design/methodology/approach
Energy dispersive spectrometer, X-ray photoelectron spectroscopy, X-Ray diffraction and scanning electron microscopy were used to evaluate the corrosion resistance of the rust layers formed on these samples. Laser confocal microscopy was used to observe the corroded surfaces of the steels.
Findings
Results showed that Sb added can consume H+ in the solution, thereby preventing the oxygen reaction to slow down the corrosion rate. Meanwhile, a stable and insoluble substance (Sb2O3) in the acidic solution would be produced when the reaction of the product of Sb and H+ with the enough dissolved oxygen in the solution. Due to the precipitation of Sb2O3 and iron oxyhydroxides, the rust layer of Sb-containing steel became more uniform and compact, which resulted in better corrosion resistance in acid environment.
Originality/value
In this study, a new-type acid resistant low-alloy steel containing Sb was developed. Compared with the results, the corrosion mechanism of the new-type low-alloy steel in acid environment was discussed.
Details
Keywords
Nian Zhang, Shuo Zheng, Lingyuan Tian and Guiwu Wei
In the supply chain disruption risk, the issue of supplier evaluation and selection is solved by an extended VIKOR method based on regret theory.
Abstract
Purpose
In the supply chain disruption risk, the issue of supplier evaluation and selection is solved by an extended VIKOR method based on regret theory.
Design/methodology/approach
Considering the influence of irrational emotions of decision makers, an evaluation model is designed by the regret theory and VIKOR method, which makes the decision-making process closer to reality.
Findings
The paper has some innovations in the evaluation index system and evaluation model construction. The method has good stability under the risk of supply chain interruption.
Originality/value
The mixed evaluation information is used to describe the attributes, and the evaluation index system is constructed by the combined method of the social network analysis method and the literature research method to ensure the accuracy and accuracy of the extracted attributes. The issue of supplier evaluation and selection is solved by an extended VIKOR method based on regret theory.
Details
Keywords
José-Antonio Corral-Marfil and Gemma Cànoves-Valiente
The proceedings of the 17 editions of the conference of the Spanish Association of Scientific Experts in Tourism constitute a valuable archival resource within the research on…
Abstract
The proceedings of the 17 editions of the conference of the Spanish Association of Scientific Experts in Tourism constitute a valuable archival resource within the research on Spanish tourism. But so far their contents have not been analyzed. The aim of this chapter is to examine the research that has been presented at its conference by means of a bibliometric analysis of the proceedings of 17 editions. The study focuses on the origin of the research (countries, regions, institutions, and authors), as well as its characteristics in terms of themes dealt with, geographical areas researched, methodologies, disciplinary areas, and attitudes toward tourism. Implications for the evolution of the research are discussed in terms of knowledge contributions and the shaping of major tourism research traditions.
Details
Keywords
Zujin Jin, Zixin Yin, Siyang Peng and Yan Liu
Large optical mirror processing systems (LOMPSs) consist of multiple subrobots, and correlated disturbance terms between these robots often lead to reduced processing accuracy…
Abstract
Purpose
Large optical mirror processing systems (LOMPSs) consist of multiple subrobots, and correlated disturbance terms between these robots often lead to reduced processing accuracy. This abstract introduces a novel approach, the nonlinear subsystem adaptive dispersed fuzzy compensation control (ADFCC) method, aimed at enhancing the precision of LOMPSs.
Design/methodology/approach
The ADFCC model for LOMPS is developed through a nonlinear fuzzy adaptive algorithm. This model incorporates control parameters and disturbance terms (such as those arising from the external environment, friction and correlation) between subsystems to facilitate ADFCC. Error analysis is performed using the subsystem output parameters, and the resulting errors are used as feedback for compensation control.
Findings
Experimental analysis is conducted, specifically under the commonly used concentric circle processing trajectory in LOMPS. This analysis validates the effectiveness of the control model in enhancing processing accuracy.
Originality/value
The ADFCC strategy is demonstrated to significantly improve the accuracy of LOMPS output, offering a promising solution to the problem of correlated disturbances. This work holds the potential to benefit a wide range of practical applications.
Details
Keywords
Huizhong Zhang, Yu Zuo, Pengfei Ju, Jian Zhang, Xuhui Zhao, Yuming Tang and Xiaofeng Zhang
The purpose of this paper is to study the variations of composition and properties of the passive film on 316 L stainless steel surface in 80°C, 0.5 mol L-1 H2SO4 + 2 mg L-1 NaF…
Abstract
Purpose
The purpose of this paper is to study the variations of composition and properties of the passive film on 316 L stainless steel surface in 80°C, 0.5 mol L-1 H2SO4 + 2 mg L-1 NaF solution, is helpful to understand the mechanisms of corrosion resistancethe of plated Pd on 316 L ss.
Design/methodology/approach
The variations of composition and properties of the passive film on 316 L stainless steel surface in 80°C, 0.5 mol L-1 H2SO4 + 2 mg L-1 NaF solution after connected to Pd electrode were studied with methods of potential monitor, X-ray photoelectron spectroscopy analysis and electrochemical impedance spectrum (EIS) measurement.
Findings
By connecting to a Pd electrode, the potential of the SS sample increased from the active region to the passive region. By connecting to the Pd electrode, the contents of Cr, Cr(OH)3 and Fe3O4 in passive film increased obviously. With increased Pd/SS area ratio, the Cr(OH)3 content in passive film increased but the Fe3O4 content changed little. The results show that after connecting to Pd the corrosion resistance of the passive film on 316 L stainless steel increases obviously, which may be attributed to the more compact passive film because of higher Cr, Cr(OH)3 and Fe3O4 contents and less point defects in the film.
Originality/value
The effects and mechanism of Pd on passivation of SS was studied.
Details
Keywords
Yiqun Kuang, Hong Cheng, Yali Zheng, Fang Cui and Rui Huang
This paper aims to present a one-shot gesture recognition approach which can be a high-efficient communication channel in human–robot collaboration systems.
Abstract
Purpose
This paper aims to present a one-shot gesture recognition approach which can be a high-efficient communication channel in human–robot collaboration systems.
Design/methodology/approach
This paper applies dynamic time warping (DTW) to align two gesture sequences in temporal domain with a novel frame-wise distance measure which matches local features in spatial domain. Furthermore, a novel and robust bidirectional attention region extraction method is proposed to retain information in both movement and hold phase of a gesture.
Findings
The proposed approach is capable of providing efficient one-shot gesture recognition without elaborately designed features. The experiments on a social robot (JiaJia) demonstrate that the proposed approach can be used in a human–robot collaboration system flexibly.
Originality/value
According to previous literature, there are no similar solutions that can achieve an efficient gesture recognition with simple local feature descriptor and combine the advantages of local features with DTW.
Details
Keywords
Gaoxin Cheng, Linsen Xu, Jiajun Xu, Jinfu Liu, Jia Shi, Shouqi Chen, Lei Liu, Xingcan Liang and Yang Liu
This paper aims to develop a robotic mirror therapy system for lower limb rehabilitation, which is applicable for different patients with individual movement disability levels.
Abstract
Purpose
This paper aims to develop a robotic mirror therapy system for lower limb rehabilitation, which is applicable for different patients with individual movement disability levels.
Design/methodology/approach
This paper puts forward a novel system that includes a four-degree-of-freedom sitting/lying lower limb rehabilitation robot and a wireless motion data acquisition system based on mirror therapy principle. The magnetorheological (MR) actuators are designed and manufactured, whose characteristics are detected theoretically and experimentally. The passive training control strategy is proposed, and the trajectory tracking experiments verify its feasibility. Also, the active training controller that is adapt to the human motor ability is designed and evaluated by the comparison experiments.
Findings
The MR actuators produce continuously variable and compliant torque for robotic joints by adjusting excitation current. The reference limb joint position data collected by the wireless motion data acquisition system can be used as the motion trajectory of the robot to drive the affected limb. The passive training strategy based on proportional-integral control proves to have great trajectory tracking performance through experiments. In the active training mode, by comparing the real-time parameters adjustment in two phases, it is certified that the proposed fuzzy-based regulated impedance controller can adjust assistance torque according to the motor ability of the affected limb.
Originality/value
The system developed in this paper fulfills the needs of robot-assisted mirror therapy for hemiplegic patients.
Details
Keywords
The purpose of this chapter is to propose a theory which may lead to a holistic description of the mechanism of touristic phenomena. In so doing, the central discussion is to…
Abstract
The purpose of this chapter is to propose a theory which may lead to a holistic description of the mechanism of touristic phenomena. In so doing, the central discussion is to provide descriptive answers to basic questions. It will not be a sociological or anthropological discourse. Instead, it will use perspectives from environmental psychology, genetics, and a theory of information energy in elementary particle physics. The study of tourism, though it is not a distinct disciplinary field, must provide a grand theory. In this chapter, the discussions mainly focus on the concept of tourist to provide several ideas to amend its definition, which may directly correspond to an overall view of touristic phenomena.
Details
Keywords
Umesh K. Raut and L.K. Vishwamitra
Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource…
Abstract
Purpose
Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource allocation strategy is focused on which the seek-and-destroy algorithm is implemented in the controller in such a way that an effective allocation of the resources is done based on the multi-objective function.
Design/methodology/approach
The purpose of this study is focuses on the resource allocation algorithm for the SDVN with the security analysis to analyse the effect of the attacks in the network. The genuine nodes in the network are granted access to the communication in the network, for which the factors such as trust, throughput, delay and packet delivery ratio are used and the algorithm used is Seek-and-Destroy optimization. Moreover, the optimal resource allocation is done using the same optimization in such a way that the network lifetime is extended.
Findings
The security analysis is undergoing in the research using the simulation of the attackers such as selective forwarding attacks, replay attacks, Sybil attacks and wormhole attacks that reveal that the replay attacks and the Sybil attacks are dangerous attacks and in future, there is a requirement for the security model, which ensures the protection against these attacks such that the network lifetime is extended for a prolonged communication. The achievement of the proposed method in the absence of the attacks is 84.8513% for the remaining nodal energy, 95.0535% for packet delivery ratio (PDR), 279.258 ms for transmission delay and 28.9572 kbps for throughput.
Originality/value
The seek-and-destroy algorithm is one of the swarm intelligence-based optimization designed based on the characteristics of the scroungers and defenders, which is completely novel in the area of optimizations. The diversification and intensification of the algorithm are perfectly balanced, leading to good convergence rates.
Details