Microstructural Engineering in Eutectoid Steel: A Technological Possibility?

2018 ◽  
Vol 49 (5) ◽  
pp. 1520-1535 ◽  
Author(s):  
A. Durgaprasad ◽  
S. Giri ◽  
S. Lenka ◽  
S. Kundu ◽  
S. Chandra ◽  
...  
Author(s):  
N. Ridley ◽  
S.A. Al-Salman ◽  
G.W. Lorimer

The application of the technique of analytical electron microscopy to the study of partitioning of Mn (1) and Cr (2) during the austenite-pearlite transformation in eutectoid steels has been described in previous papers. In both of these investigations, ‘in-situ’ analyses of individual cementite and ferrite plates in thin foils showed that the alloying elements partitioned preferentially to cementite at the transformation front at higher reaction temperatures. At lower temperatures partitioning did not occur and it was possible to identify a ‘no-partition’ temperature for each of the steels examined.In the present work partitioning during the pearlite transformation has been studied in a eutectoid steel containing 1.95 wt% Si. Measurements of pearlite interlamellar spacings showed, however, that except at the highest reaction temperatures the spacing would be too small to make the in-situ analysis of individual cementite plates possible, without interference from adjacent ferrite lamellae. The minimum diameter of the analysis probe on the instrument used, an EMMA-4 analytical electron microscope, was approximately 100 nm.


2001 ◽  
Vol 44 (8-9) ◽  
pp. 1775-1779 ◽  
Author(s):  
Z.G Liu ◽  
X.J Hao ◽  
K Masuyama ◽  
K Tsuchiya ◽  
M Umemoto ◽  
...  

1997 ◽  
Vol 20 (12) ◽  
pp. 1677-1686 ◽  
Author(s):  
K. Katagiri ◽  
T. Sato ◽  
H. S. Shin ◽  
L. Takahashi ◽  
H. Mori ◽  
...  

Author(s):  
Maureen Ebben ◽  
Julien S. Murphy

This chapter charts the language of privacy in published scholarship on mental health apps. What definition of privacy is assumed? What meanings of privacy are deployed in the research about mental health apps? Using a qualitative thematic approach, this analysis shows that privacy language can be understood as occurring in three phases: Phase 1: Discourse of Technological Possibility; Phase 2: Discourse of Privacy Challenges and Threats; and Phase 3: Discourse of Advocacy. The authors discuss each of these phases and propose a more critical discourse of privacy by identifying the issues inherent in understanding privacy as security.


Sign in / Sign up

Export Citation Format

Share Document