Research article Special Issues

Effects of solution composition on corrosion behavior of 13 mass% Cr martensitic stainless steel in simulated oil and gas environments

  • The effects of CH3COONa and CO2 on the corrosion behavior of 13 mass% Cr martensitic stainless steel in simulated oil and gas environments were investigated with electrochemical and surface analysis techniques. The electrochemical results showed that a plateau region and sudden increase in the current density of the anodic polarization curves. The current density of the plateau region decreased with increasing CH3COONa concentrations. The pitting corrosion potential shifted to the positive direction with increasing CH3COONa concentrations, and shifted to a negative value by adding CO2. From the surface analysis, a Cr enriched layer had formed on the sample surface after immersion tests, and the thickness of this layer became thinner with increasing CH3COONa concentration. The surface analysis results after the immersion tests suggested the presence of CH3COO or HCO3 on the surface.

    Citation: Masatoshi Sakairi, Hirotaka Mizukami, Shuji Hashizume. Effects of solution composition on corrosion behavior of 13 mass% Cr martensitic stainless steel in simulated oil and gas environments[J]. AIMS Materials Science, 2019, 6(2): 288-300. doi: 10.3934/matersci.2019.2.288

    Related Papers:

    [1] Meijiao Wang, Yu chen, Yunyun Wu, Libo He . Spatial co-location pattern mining based on the improved density peak clustering and the fuzzy neighbor relationship. Mathematical Biosciences and Engineering, 2021, 18(6): 8223-8244. doi: 10.3934/mbe.2021408
    [2] Hui Du, Depeng Lu, Zhihe Wang, Cuntao Ma, Xinxin Shi, Xiaoli Wang . Fast clustering algorithm based on MST of representative points. Mathematical Biosciences and Engineering, 2023, 20(9): 15830-15858. doi: 10.3934/mbe.2023705
    [3] Zhihe Wang, Huan Wang, Hui Du, Shiyin Chen, Xinxin Shi . A novel density peaks clustering algorithm for automatic selection of clustering centers based on K-nearest neighbors. Mathematical Biosciences and Engineering, 2023, 20(7): 11875-11894. doi: 10.3934/mbe.2023528
    [4] Lei Zhang, Lina Ge . A clustering-based differential privacy protection algorithm for weighted social networks. Mathematical Biosciences and Engineering, 2024, 21(3): 3755-3773. doi: 10.3934/mbe.2024166
    [5] He Ma . Achieving deep clustering through the use of variational autoencoders and similarity-based loss. Mathematical Biosciences and Engineering, 2022, 19(10): 10344-10360. doi: 10.3934/mbe.2022484
    [6] Chunkai Zhang, Ao Yin, Wei Zuo, Yingyang Chen . Privacy preserving anomaly detection based on local density estimation. Mathematical Biosciences and Engineering, 2020, 17(4): 3478-3497. doi: 10.3934/mbe.2020196
    [7] Hao Yuan, Qiang Chen, Hongbing Li, Die Zeng, Tianwen Wu, Yuning Wang, Wei Zhang . Improved beluga whale optimization algorithm based cluster routing in wireless sensor networks. Mathematical Biosciences and Engineering, 2024, 21(3): 4587-4625. doi: 10.3934/mbe.2024202
    [8] Yuan Tian, Biao Song, Mznah Al Rodhaan, Chen Rong Huang, Mohammed A. Al-Dhelaan, Abdullah Al-Dhelaan, Najla Al-Nabhan . A stochastic location privacy protection scheme for edge computing. Mathematical Biosciences and Engineering, 2020, 17(3): 2636-2649. doi: 10.3934/mbe.2020144
    [9] Muhammad Firdaus, Siwan Noh, Zhuohao Qian, Harashta Tatimma Larasati, Kyung-Hyune Rhee . Personalized federated learning for heterogeneous data: A distributed edge clustering approach. Mathematical Biosciences and Engineering, 2023, 20(6): 10725-10740. doi: 10.3934/mbe.2023475
    [10] Yunyun Sun, Peng Li, Zhaohui Jiang, Sujun Hu . Feature fusion and clustering for key frame extraction. Mathematical Biosciences and Engineering, 2021, 18(6): 9294-9311. doi: 10.3934/mbe.2021457
  • The effects of CH3COONa and CO2 on the corrosion behavior of 13 mass% Cr martensitic stainless steel in simulated oil and gas environments were investigated with electrochemical and surface analysis techniques. The electrochemical results showed that a plateau region and sudden increase in the current density of the anodic polarization curves. The current density of the plateau region decreased with increasing CH3COONa concentrations. The pitting corrosion potential shifted to the positive direction with increasing CH3COONa concentrations, and shifted to a negative value by adding CO2. From the surface analysis, a Cr enriched layer had formed on the sample surface after immersion tests, and the thickness of this layer became thinner with increasing CH3COONa concentration. The surface analysis results after the immersion tests suggested the presence of CH3COO or HCO3 on the surface.


    Data mining, also, refers as knowledge discovery in database (KDD) [2,8,16,17], is a commonly way to find the useful and meaningful knowledge from databases, which could be utilized in several real-life applications. Although data mining techniques can discover the useful information and knowledge, it reveals, however, the confidential or private message from the discovered information, which may cause the security threats [11,12,39]. Privacy-preserving data mining [3,5,35,37,31,32] has thus become an important issue in recent decades since it can not only hide the private information but also discover the required information by varied data mining techniques. Data sanitization is one of the major research of PPDM that perturbs the database to hide the sensitive information. During the sanitization progress, it usually causes three side effects, for instance, hiding failure, missing cost, and artificial cost. Existing methods are used to minimize those three side effects during the sanitization progress, which can be regarded as the NP-hard problem [3,37]. Several works related to PPDM were respectively discussed and most of them are based on the deletion procedure to hide the sensitive information [13,14,21,27,38].

    Conventional algorithms in PPDM mostly focus on hiding the sensitive information as much as possible; the PPDM is, however considered as the NP-hard problem since it has the trade-off relationships among the derived three side effects. Lin et al. proposed the GA-based algorithms to hide the sensitive itemsets and utilize transaction deletion procedure for sanitization [28,29]. The optimal transactions for deletion are then obtained and the results showed that less side effects can be achieved compared to the greedy-based method. Lin et al. [30] then designed the PSO-based model to handle the sanitization progress in PPDM. However, the above algorithms rely on the pre-defined weights to design the importances of three side effects, which requires the a-priori knowledge to set up the weight values. The pre-defined weights may seriously affect the results to select the transactions for deletion. To handle this problem, Cheng et al. [10] developed the EMO-based algorithm to consider "data distortion" and "knowledge distortion" in the sanitization progress through item deletion. This approach is efficient but it may lead the incomplete knowledge in the mining procedure. For example, the deleted information in the hospital diagnosis may mislead the wrong diagnosis and treatment.

    Multi-objective particle swarm optimization (MOPSO) algorithm [7] is extended from conventional particle swarm optimization algorithm [24], that handles the multi-objective problems to find a set of Pareto solutions. Since the MOPSO-based framework uses the dominance relationship to find better solutions, the traditional method used in the PSO-based framework cannot be used to find better solutions. In this paper, we aim at designing a multiple optimization particle swarm optimization algorithm by adapting the density-based (CMPSO) method for finding better solutions rather than the single objective algorithms. Major contributions are listed below.

    ● We design a multiple optimization particle swarm optimization (named CMPSO) algorithm for hiding the sensitive information, which achieves better performance than the single objective algorithms in terms of three side effects.

    ● The density-based clustering method is adapted here to obtain better diversity of the derived Pareto solutions.

    ● Extensive experiments are conducted to show the performance of the designed algorithm in terms of three side effects, and results outperform the single-objective algorithms.

    The rest of this paper is organized as follows. Literature review is shown in Section 2. Preliminary and problem statement are discussed in Section 3. The designed algorithm is stated in Section 4. Several experiments are carried and conducted in Section 5. Conclusion and future work are discussed in Section 6.

    The related works of privacy-preserving data mining (PPDM) and the evolutionary computation are described as follows.

    In recent two decades, data mining techniques [17,16,33] are efficient to mine and find the potential information from a very large database, especially the relationships between the products may not be easily discovered and visualized. Since the important data can be revealed from the databases, thus the confidential and secure information can also be discovered during the mining procedure, that causes the privacy and security threats to users. Privacy-preserving data mining (PPDM) has become a critical issue in recent years since it can, not only find the useful information but also hide the confidential data after the sanitization progress. Agrawal and Srikant [4] developed a novel reconstruction approach that can accurately estimate the distribution of original data. The classifiers can also be constructed to compare the accuracy between original data and the sanitized one. Verykios et al. [37] developed the hierarchical classification techniques used in PPDM. Dasseni et al. [13] then designed an approach based on the hamming-distance mechanism to decrease the support or confidence of the sensitive information (i.e., association rules) for sanitization. Oliveira and Zaiane [35] provides several sanitization methods, that can hide the frequent itemsets through the heuristic framework. Islam and Brankovic [22] presented a framework using the noise addition method to protect and hide the individual privacy and still maintained high data quality. Hong et al. provided the SIF-IDF method [21] to assign the weight to each transaction, and the sanitization progress is then performed from the transaction with highest score to the lowest one for hiding the sensitive information. Lin et al. [31] then presented a SPMF software to provide several algorithms for handling the sanitization problem in PPDM.

    The PPDM is, however, considered as a NP-hard problem [3,37], it is thus better to provide the meta-heuristic approaches to find the optimal solutions. Han and Ng developed a secure protocol to find a better set of rules without disclosing their own private data based on GAs [18]. Lin et al. then presented several GA-based approaches, such as sGA2DT [29], pGA2DT [29] and cpGA2DT [28] to hide the sensitive information by removing the victim transactions. The encoded chromosome is considered as a set of solutions, and the transaction of the gene within chromosome is concerned as the victim for later deletion. A fitness function is also developed to consider three side effects for evaluation with the pre-defined weights to show the goodness of the chromosome. Several extensions of the evolutionary computation used in PPDM were also developed [20,30]. Although the above algorithms are efficient to find the optimal transactions for deletion, they still require, however, the pre-defined weights of the side effects; this mechanism can seriously affect the final results of the designed approaches. Cheng et al. [10] then developed a EMO-RH algorithm to hide the sensitive itemsets by removing the itemset. This approach is based on multi-objective method, but the incomplete transactions can thus be produced; the mislead decision could thus be made especially in treatment of the hospital diagnoses. Lin et al. also applies the multi-objective model [32] for the deletion problem based on the grid method. An NSGA-II model [34] is also utilized to efficiently sanitize the database for transaction deletion.

    Evolutionary computation is inspired by biological evolution that attempts to find the global optimization as the solutions. An iteratively progress of the candidates is then executed to gradually find the optimized solutions. Holland [18] first applies Darwin theory of natural selection and survival of the fittest to designed the genetic algorithms (GAs), that is widely used in computational intelligence. The GAs is the fundamental method, which is the population-based method to solve the NP-hard problems. It consists of mutation, crossover, and selection operators to find the possible solutions in the evolution progress. Particle swarm optimization (PSO) is a swarm intelligence algorithm proposed by Kennedy and Eberhart that is inspired by bird flocking activities [24]. Each particle in the PSO is concerned as a potential solution. In PSO, each bird has its own velocity, which is used to represent the direction to the other solutions, and each particle is then updated with its own best value (represents as pbest) and the global best value (represented as gbest) according to the designed fitness function during each iteration. The updating equations are listed as follows [24]:

    vi(t+1)=w×vi(t)+c1×r1×(pbestixi(t))+c2×r2×(gbestxi(t)) (2.1)
    xi(t+1)=xi(t)+vi(t+1) (2.2)

    From the above equations, w is considered as a factor that is used to balance the influence of global search and local search; vi represents the velocity of the i-th particle in a population where t presents the t-th iteration. The c1 and c2 are the constant values. Both r1 and r2 are random numbers generated by a uniform distribution in the range of [0, 1]. The velocity of a particle is updated by equation (2.1), and its position is updated by equation (2.2).

    In real-world situations, optimization should consider the multiple objectives [23,36] since we may focus on varied targets to find the solutions. Several algorithms were presented to solve the multi-objective problems for optimization, such as the Non-dominated Sorting Genetic Algorithm (NSGA) [36], the strength pareto evolutionary algorithm (SPEA) [40], and the pareto archived evolution strategy (PAES) [25]. Coello et al. [7] applies the adaptive grid method to maintain the external archive. Several variants of MOPSO were respectively presented to improve the performance, and the development is still in progress.

    Let I = {i1, i2, , im} be a finite set of r distinct items occurring in the database D, and D is a set of transactions where D = {T1, T2, , Tn}, TqD. Each Tq is a subset of I and has a unique identifier q, called TID. The set of sensitive itemsets is denoted as SI = {s1, s2, , sk}, which are given by user. Note that each si of SI is a subset of Tq. The μ is the minimum support threshold in D. If sup(ij)μ×|D|, the itemset (ij) is defined as the frequent (large) itemset.

    Definition 1. For each siSI, the number of transactions for deletion of si is denoted as Nsi and defined as:

    Nsi=sup(si)μ×|D|1μ. (3.1)

    Definition 2. The Maximum number of Deleted Transactions among all sensitive itemsets in SI is denoted as MDL and defined as:

    MDT=max{Ns1,Ns2,,Nsk}. (3.2)

    Thus, the MDT is treated as the size of the particle in the designed CMPSO algorithm. In the PPDM, three side effects can be considered as "hiding failure", "missing cost", and "artificial cost", which should be minimized in the PPDM. We can obtain the definitions for three side effects as follows.

    Definition 3. Let α be the number of sensitive itemsets that fails to be hidden, in which α = |SIL|.

    Definition 4. Let β be the number of missing itemsets (cost), which is the non-sensitive itemset and the large itemset in the original database but will be hidden after the sanitization progress as: β=LSIL.

    Definition 5. Let γ be the number of artificial itemsets (cost), which was not the frequent itemset but will be arisen as the frequent one after the sanitization progress as: γ=LL.

    Problem Statement: The problem of PPDM with transaction deletion based on the multi-objective particle swarm optimization is to minimize three side effects by considering the sanitized results in three objective functions, which can be defined as:

    f=min[f1,f2,f3], (3.3)

    where f1 equals to the number of α, f2 equals to the number of β, and f3 equals to the number of the γ.

    In this section, we develop a CMPSO algorithm to hide the sensitive information by adapting the density-based clustering method to obtain higher diversity of the derived Pareto solutions, and the effects can be shown in terms of three side effects. To obtain better transactions for deletion in PPDM, the database is first processed to project the transactions with any of the sensitive information within the set of SI, and the projected database is named as D. Thus, only the transactions with the sensitive information are projected for later deletion, and those transactions in D are considered as the candidate of the particle in the evolution process. After that, the CMPSO algorithm is then iteratively performed to evaluate three side effects in the evolutionary progress. In CMPSO algorithm, each particle can be represented as a possible solution with MDT vectors, and each vector is the transaction ID, which shows the potential transaction for deletion. Note that a vector in a particle can be a null value. In the updating progress of the CMPSO in PPDM, the formulas are thus defined as follows [30]:

    vi(t+1)=(pbestxi(t))(gbestxi(t)). (4.1)
    xi(t+1)=rand(xi(t),null)+vi(t+1). (4.2)

    Thus, the particles in the designed CMPSO is updated by the above equations for the velocity and its position. The designed CMPSO algorithm is then described in Algorithm 1 as follows.

    From Algorithm 1, the designed CMPSO algorithm generates N particles with MDT size (Line 1). Each particle is then evaluated by the fitness functions with three side effects (Lines 2 to 3) to find the non-dominated solutions (Line 4). In the updating progress, the pbest and gbest are then respectively updated (Lines 6 to 7). The gbest is then updated by the sub-function to obtain a better particle for evolution. After the updating progress (Line 8), the updated particles are then evaluated again to update the non-dominated solutions. The algorithm is recursively performed until the termination criteria is achieved (Lines 5 to 10). After that, the final results will be returned with a set of non-dominated solutions (Pareto solutions).

    To obtain better Pareto solutions with higher diversity, the density-based clustering method is adapted here to select the appropriate gbest in the evolutionary progress, which was described at Line 6 in Algorithm 1. Details are then stated in Algorithm 2.

    For each Pareto solution in Algorithm 2, it finds a cluster center (Line 4) with satisfied solutions (number of Pareto solutions is no less than minpts) within a radius r (Line 3). After that, each solution within a cluster is then assigned with a probability (Lines 6 to 7), and a global solution (gbest) is then derived randomly by the assigned probability (Line 8). This progress increases the diversity of the discovered Pareto solutions in the evolution progress. After that, the gbest is then derived and used in the Algorithm 1 for iteratively evolution.

    Substantial experiments were carried to compare the effectiveness and efficiency of the proposed CMPSO algorithm to the state-of-the-art single-objective cpGA2DT [28] and PSO2DT [30] approaches. The algorithms in the experiments are implemented in Java language, performing on a PC with an Intel Core i7-6700 quad-core processor and 8 GB of RAM under the 64-bit Microsoft Windows 10 operating system. Two real-world datasets [15] called chess and foodmart are used in the experiments. Results in terms of three side effects are respectively discussed and analyzed as follows.

    In this section, the state-of-the-art single-objective algorithms such as cpGA2DT [28] and PSO2DT [30] are then compared to the designed CMPSO algorithm. The number of population for all evolutionary algorithm is set as 50. Since the multi-objective algorithm would produce a set of Pareto-front solutions, we evaluate the side effects by average of the produced solutions. Thus, in the dense dataset such as chess, the CMPSO sometimes shows worse results in terms of side effects compared to the single objective algorithms, but in the sparse dataset such as foodmart, the CMPSO generally obtains good performance than the others. Results for the chess dataset are shown in Figure 1.

    Figure 1.  Compared results of the chess dataset.

    From Figure 1, it can be seen that the single-objective algorithms such as cpGA2DT and PSO2DT sometimes have better performance than the designed CMPSO approach. The reasons are that the designed CMPSO algorithm evaluates three side effects by the average value of the derived solutions. For the dense dataset such as chess, the diversity of the derived solutions is not high; the discovered Pareto solutions could be converged together due to the characteristics of the dataset. Moreover, The designed CMPSO algorithm produces a set of solutions, for example in the experiments, the number of Pareto solutions can be more than 20. Thus, the average values of three side effects sometimes could not achieve better results. Experiments under the sparse foodmart dataset are shown in Figure 2.

    Figure 2.  Compared results of the foodmart dataset.

    From Figure 2, we can observe that the designed CMPSO algorithm has good performance than the single-objective cpGA2DT and PSO2DT algorithms in most cases. For example, when the sensitive percentages are respectively set as 8%, 10%, 12%, and 14%, the designed CMPSO achieves best performance than the other single-objective algorithms. The reasons are that when the dataset is a sparse dataset, higher diversity of the designed CMPSO algorithm can be obtained. Thus, the selected transactions may contain the minimal side effects for deletion. Moreover, all three algorithms have no artificial cost under varied percentages of sensitivity.

    In recent years, many algorithms were presented to hide the private/confidential information in privacy-preserving data mining (PPDM) and most of them were designed to sanitize the database for hiding the sensitive information. In this paper, we first introduce a CMPSO algorithm for hiding the sensitive information based on density clustering method for sanitizing the databases. The designed updating algorithm for gbest can achieve good performance compared to the single objective algorithms, especially for the sparse dataset, which can be seen in the experiments.

    This research was partially supported by the Shenzhen Technical Project under KQJSCX20170726103424709 and JCYJ20170307151733005



    [1] Masamura K, Hashizume S, Sakai J, et al. (1987) Polarization behavior of high-alloy OCTG in CO2 environment as affected by chlorides and sulfides. Corrosion 43: 359–365. doi: 10.5006/1.3583871
    [2] Kimura M, Miyata Y, Yamane Y, et al. (1999) Corrosion resistance of high-strength modified 13% Cr steel. Corrosion 55: 756–761. doi: 10.5006/1.3284030
    [3] Guo XP, Tomoe Y (1998) Electrochemical behavior of carbon steel in carbon dioxide-saturated diglycolamine solutions. Corrosion 54: 931–939. doi: 10.5006/1.3284812
    [4] Kimura M, Miyata Y, Toyooka T, et al. (2001) Effect of retained austenite on corrosion performance for modified 13% Cr steel pipe. Corrosion 57: 433–439. doi: 10.5006/1.3290367
    [5] Turnbull A, Griffiths A (2003) Review: Corrosion and cracking of weldable 13 wt-%Cr martensitic stainless steels for application in the oil and gas industry. Corros Eng Sci Techn 38: 21–50. doi: 10.1179/147842203225001432
    [6] Anselmo N, May JE, Mariano NA, et al. (2006) Corrosion behavior of supermartensitic stainless steel in aerated and CO2-saturated synthetic seawater. Mat Sci Eng A-Struct 428: 73–79. doi: 10.1016/j.msea.2006.04.107
    [7] Sunaba T, Meng H, Tomoe Y, et al. (2009) Corrosion experience of 13%Cr steel tubing and laboratory evaluation of super 13Cr steel in sweet environments containing acetic acid and trace amounts of H2S. Corrosion 2009, NACE International, NACE-09568.
    [8] Sunaba T, Ito T, Miyata Y, et al. (2014) Influence of chloride ions on corrosion of modified martensitic stainless steels at high temperatures under a CO2 environment. Corrosion 70: 988–999. doi: 10.5006/1141
    [9] Liu D, Qiu YB, Tomoe Y, et al. (2011) Interaction of inhibitors with corrosion scale formed on N80 steel in CO2‐saturated NaCl solution. Mater Corros 62: 1153–1158. doi: 10.1002/maco.201106075
    [10] Zhang Y, Pang X, Qu S, et al. (2012) Discussion of the CO2 corrosion mechanism between low partial pressure and supercritical condition. Corros Sci 59: 186–197. doi: 10.1016/j.corsci.2012.03.006
    [11] Liu QY, Mao LJ, Zhou SW (2014) Effects of chloride content on CO2 corrosion of carbon steel in simulated oil and gas well environments. Corros Sci 84: 165–171. doi: 10.1016/j.corsci.2014.03.025
    [12] Islam MA, Farhat ZN (2013) The synergistic effect between erosion and corrosion of API pipeline in CO2 and saline medium. Tribol Int 68: 26–34. doi: 10.1016/j.triboint.2012.10.026
    [13] Hashizume S, Minami Y, Ishizawa Y (1998) Corrosion resistance of martensitic stainless steels in environments simulating carbon dioxide gas wells. Corrosion 54: 1003–1011. doi: 10.5006/1.3284813
    [14] Hashizume S, Nakayama T, Sakairi M, et al. (2008) Electrochemical behavior of low C-13%Cr weld joints by using solution flow type micro-droplet cell. Corrosion 2018, NACE International, NACE-08102.
    [15] Hashizume S, Nakayama T, Sakairi M, et al. (2009) Effect of PWHT on electrochemical behavior of low C-13%Cr welded joints with the use of a solution flow type micro-droplet cell. Corrosion 2009, NACE International, NACE-09089.
    [16] Sakairi M, Nakayama T, Kikuchi T, et al. (2009) Electrochemical noise analysis of 13 mass% Cr stainless steel HAZ by solution flow type micro-droplet cell-Effect of solution concentration-. ECS Trans 16: 281–290.
    [17] Hashizume S, Nakayama T, Sakairi M, et al. (2011) SCC mechanism near fusion line of low C-13%Cr welded joints. Zairyo-to-Kankyo 60: 196–201. doi: 10.3323/jcorr.60.196
    [18] Sakairi M, Kikawa A, Hashizume S, et al. (2013) Effect of sodium acetate in model oil and gas environments on oxide film structure and corrosion behavior of 13%Cr stainless steel. Proceedings of NACE International East Asia and Pacific Rim Area Conference and Expo 2013, Kyoto, EPA13-4605.
    [19] Fierro G, Ingo GM, Mancia F (1989) XPS investigation on the corrosion behavior of 13Cr-martensitic stainless steel in CO2-H2S-Cl environments. Corrosion 45: 814–823. doi: 10.5006/1.3584988
    [20] Fierro G, Ingo GM, Mancia F, et al. (1990) XPS investigation on AISI 420 stainless steel corrosion in oil and gas well environments. J Mater Sci 25: 1407–1415. doi: 10.1007/BF00585458
    [21] Islam MA, Farhat ZN (2015) Characterization of the corrosion layer on pipeline steel in sweet environment. J Mater Eng Perform 24: 3142–3158. doi: 10.1007/s11665-015-1564-4
    [22] Nicic I, Macdonald DD (2008) The passivity of Type 316L stainless steel in borate buffer solution. J Nucl Mater 379: 54–58. doi: 10.1016/j.jnucmat.2008.06.014
    [23] Ikeo N, Iijima Y, Niimura N, et al. (1991) Handbook of X-Ray photoelectron spectroscopy, Tokyo, Japan: JEOL Ltd.
    [24] Descostes M, Mercier F, Thromat N, et al. (2000) Use of XPS in the determination of chemical environment and oxidation state of iron and sulfur samples: constitution of a data basis in binding energies for Fe and S reference compounds and applications to the evidence of surface species of an oxidized pyrite in a carbonate medium. Appl Surf Sci 165: 288–302. doi: 10.1016/S0169-4332(00)00443-8
    [25] Jung RH, Tsuchiya H, Fujimoto S (2012) XPS characterization of passive films formed on Type 304 stainless steel in humid atmosphere. Corros Sci 58: 62–68. doi: 10.1016/j.corsci.2012.01.006
    [26] Yin ZF, Wang XZ, Liu L, et al. (2011) Characterization of corrosion product layers from CO2 corrosion of 13Cr stainless steel in simulated oilfield solution. J Mater Eng Perform 20: 1330–1335. doi: 10.1007/s11665-010-9769-z
    [27] Zhang J, Wang ZL, Wang ZM, et al. (2012) Chemical analysis of the initial corrosion layer on pipeline steels in simulated CO2-enhanced oil recovery brines. Corros Sci 65: 397–404. doi: 10.1016/j.corsci.2012.08.045
    [28] Ramis G, Busca G, Lorenzelli V (1991) Low-temperature CO2 adsorption on metal oxides: spectroscopic characterization of some weakly adsorbed species. Mater Chem Phys 29: 425–435. doi: 10.1016/0254-0584(91)90037-U
    [29] Hiyoshi N, Yoga K, Yashima T (2005) Adsorption of carbon dioxide on aminosilane-modified mesoporous silica. J Jpn Petrol Inst 48: 20–36.
    [30] Yoshida H, Adachi Y, Kamegawa K (1982) Fourier transform infrared spectra of activated carbons. Tanso 111: 149–153.
    [31] Geng W, Nakajima T, Takanashi H, et al. (2009) Analysis of carboxyl group in coal and coal aromaticity by Fourier transform infrared (FT-IR) spectrometry. Fuel 88: 139–144. doi: 10.1016/j.fuel.2008.07.027
    [32] Maurice V, Yang WP, Marcus P (1998) X-ray photoelectron spectroscopy and scanning tunneling microscopy study of passive films formed on (100) Fe–18Cr–13Ni single-crystal surfaces. J Electrochem Soc 145: 909–920. doi: 10.1149/1.1838366
    [33] Tardio S, Abel ML, Carr RH, et al. (2015) Comparative study of the native oxide on 316L stainless steel by XPS and ToF-SIMS. J Vac Sci Technol A 33: 05E122.
  • This article has been cited by:

    1. Shalini Jangra, Durga Toshniwal, VIDPSO: Victim item deletion based PSO inspired sensitive pattern hiding algorithm for dense datasets, 2020, 57, 03064573, 102255, 10.1016/j.ipm.2020.102255
    2. Malik Jahan Khan, Cynthia Khan, Performance evaluation of fuzzy clustered case-based reasoning, 2021, 33, 0952-813X, 313, 10.1080/0952813X.2020.1744194
    3. Madhulika Yarlagadda, K. Gangadhara Rao, A. Srikrishna, Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering, 2019, 13191578, 10.1016/j.jksuci.2019.09.002
    4. Jimmy Ming-Tai Wu, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger, Jerry Chun-Wei Lin, Hiding sensitive information in eHealth datasets, 2021, 117, 0167739X, 169, 10.1016/j.future.2020.11.026
    5. Jerry Chun-Wei Lin, Gautam Srivastava, Yuyu Zhang, Youcef Djenouri, Moayad Aloqaily, Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments, 2021, 8, 2327-4662, 5340, 10.1109/JIOT.2020.3032896
    6. Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments, 2019, 7, 2169-3536, 49232, 10.1109/ACCESS.2019.2909040
    7. Hao Wang, Guangmin Sun, Kun Zheng, Hui Li, Jie Liu, Yu Bai, Privacy protection generalization with adversarial fusion, 2022, 19, 1551-0018, 7314, 10.3934/mbe.2022345
    8. Chance Desmet, Diane J. Cook, Recent Developments in Privacy-preserving Mining of Clinical Data, 2021, 2, 2691-1922, 1, 10.1145/3447774
    9. Ali Muhammad, Noor Ul Amin, Insaf Ullah, Ahmed Alsanad, Saddam Hussain, Suheer Al-Hadhrami, M. Irfan Uddin, Hizbullah Khattak, Muhammad Asghar Khan, Dilbag Singh, An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature, 2021, 2021, 1563-5147, 1, 10.1155/2021/9960264
    10. Ruijia Li, Zhiling Cai, A clustering algorithm based on density decreased chain for data with arbitrary shapes and densities, 2023, 53, 0924-669X, 2098, 10.1007/s10489-022-03583-4
    11. Mira Lefkir, Farid Nouioua, Philippe Fournier-Viger, Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization, 2023, 53, 0924-669X, 10027, 10.1007/s10489-022-03808-6
    12. Ryosuke Sonoda, Fair oversampling technique using heterogeneous clusters, 2023, 640, 00200255, 119059, 10.1016/j.ins.2023.119059
    13. Bo Xiong, Hongmei Chen, Tianrui Li, Xiaoling Yang, Robust multi-view clustering in latent low-rank space with discrepancy induction, 2023, 53, 0924-669X, 23655, 10.1007/s10489-023-04699-x
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(6535) PDF downloads(705) Cited by(2)

Figures and Tables

Figures(10)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog