Articolul precedent |
Articolul urmator |
636 0 |
SM ISO690:2012 KARABASSOV, T., STOLYAROV, V., GOLUBOV, Alexander, SILKIN, V., BAYAZITOV, Vadim, L'VOV, Boris, VASENKO, A.. Competitive 0 and π states in S/F/S trilayers: multimode approach. In: NANO: - 2019: Limits of Nanoscience and Nanotechnologies, Ed. 2019, 24-27 septembrie 2019, Chişinău. Chișinău, Republica Moldova: 2019, p. 32. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
NANO 2019 | |
Conferința "SPINTECH Summer school “S/F Hybrid Structures for Spintronics”" 2019, Chişinău, Moldova, 24-27 septembrie 2019 | |
|
|
Pag. 32-32 | |
Descarcă PDF | |
Rezumat | |
We investigate the behavior of the critical temperature Tc in superconductor/ ferromagnet / superconductor (S/F/S) trilayers in the dirty limit as a function of the ferromagnetic layer thickness df and the S/F interface transparency. This system is interesting due to the possibility of realization of competitive 0 and π states. We perform Tc calculations using the general self-consistent multimode approach based on the Usadel equations in Matsubara Green’s functions technique, and compare the results with the single-mode approximation, widely used in the literature. Both methods produce similar results for sufficiently low interface transparency. For transparent interfaces we obtain a qualitatively different Tc(df) behavior [1]. Using the multimode approach we observe multiple 0- π transitions in critical temperature, which cannot be resolved by the single-mode approximation. We also calculate the critical S layer thickness at given df when an S/F/S trilayer still has a nonzero critical temperature. Finally, we establish the limits of applicability of the single-mode approximation. |
|
|
Cerif XML Export
<?xml version='1.0' encoding='utf-8'?> <CERIF xmlns='urn:xmlns:org:eurocris:cerif-1.5-1' xsi:schemaLocation='urn:xmlns:org:eurocris:cerif-1.5-1 http://www.eurocris.org/Uploads/Web%20pages/CERIF-1.5/CERIF_1.5_1.xsd' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' release='1.5' date='2012-10-07' sourceDatabase='Output Profile'> <cfResPubl> <cfResPublId>ibn-ResPubl-92691</cfResPublId> <cfResPublDate>2019</cfResPublDate> <cfStartPage>32</cfStartPage> <cfISBN></cfISBN> <cfURI>https://ibn.idsi.md/ro/vizualizare_articol/92691</cfURI> <cfTitle cfLangCode='EN' cfTrans='o'>Competitive 0 and π states in S/F/S trilayers: multimode approach</cfTitle> <cfAbstr cfLangCode='EN' cfTrans='o'><p>We investigate the behavior of the critical temperature Tc in superconductor/ ferromagnet / superconductor (S/F/S) trilayers in the dirty limit as a function of the ferromagnetic layer thickness df and the S/F interface transparency. This system is interesting due to the possibility of realization of competitive 0 and π states. We perform Tc calculations using the general self-consistent multimode approach based on the Usadel equations in Matsubara Green’s functions technique, and compare the results with the single-mode approximation, widely used in the literature. Both methods produce similar results for sufficiently low interface transparency. For transparent interfaces we obtain a qualitatively different Tc(df) behavior [1]. Using the multimode approach we observe multiple 0- π transitions in critical temperature, which cannot be resolved by the single-mode approximation. We also calculate the critical S layer thickness at given df when an S/F/S trilayer still has a nonzero critical temperature. Finally, we establish the limits of applicability of the single-mode approximation.</p></cfAbstr> <cfResPubl_Class> <cfClassId>eda2d9e9-34c5-11e1-b86c-0800200c9a66</cfClassId> <cfClassSchemeId>759af938-34ae-11e1-b86c-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfResPubl_Class> <cfResPubl_Class> <cfClassId>e601872f-4b7e-4d88-929f-7df027b226c9</cfClassId> <cfClassSchemeId>40e90e2f-446d-460a-98e5-5dce57550c48</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfResPubl_Class> <cfPers_ResPubl> <cfPersId>ibn-person-71758</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfPers_ResPubl> <cfPers_ResPubl> <cfPersId>ibn-person-71759</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfPers_ResPubl> <cfPers_ResPubl> <cfPersId>ibn-person-22136</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfPers_ResPubl> <cfPers_ResPubl> <cfPersId>ibn-person-71761</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfPers_ResPubl> <cfPers_ResPubl> <cfPersId>ibn-person-58309</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfPers_ResPubl> <cfPers_ResPubl> <cfPersId>ibn-person-65570</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfPers_ResPubl> <cfPers_ResPubl> <cfPersId>ibn-person-71762</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> </cfPers_ResPubl> </cfResPubl> <cfPers> <cfPersId>ibn-Pers-71758</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-71758-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> <cfFamilyNames>Karabassov</cfFamilyNames> <cfFirstNames>T.</cfFirstNames> </cfPersName_Pers> </cfPers> <cfPers> <cfPersId>ibn-Pers-71759</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-71759-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> <cfFamilyNames>Stolyarov</cfFamilyNames> <cfFirstNames>V.</cfFirstNames> </cfPersName_Pers> </cfPers> <cfPers> <cfPersId>ibn-Pers-22136</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-22136-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> <cfFamilyNames>Golubov</cfFamilyNames> <cfFirstNames>Alexander</cfFirstNames> </cfPersName_Pers> </cfPers> <cfPers> <cfPersId>ibn-Pers-71761</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-71761-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> <cfFamilyNames>Silkin</cfFamilyNames> <cfFirstNames>V.</cfFirstNames> </cfPersName_Pers> </cfPers> <cfPers> <cfPersId>ibn-Pers-58309</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-58309-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> <cfFamilyNames>Bayazitov</cfFamilyNames> <cfFirstNames>Vadim</cfFirstNames> </cfPersName_Pers> </cfPers> <cfPers> <cfPersId>ibn-Pers-65570</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-65570-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> <cfFamilyNames>L'vov</cfFamilyNames> <cfFirstNames>Boris</cfFirstNames> </cfPersName_Pers> </cfPers> <cfPers> <cfPersId>ibn-Pers-71762</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-71762-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2019T24:00:00</cfStartDate> <cfFamilyNames>Vasenko</cfFamilyNames> <cfFirstNames>A.</cfFirstNames> </cfPersName_Pers> </cfPers> </CERIF>