Premium Essay

Pm3110 Unit 6 Lab Report

Submitted By
Words 344
Pages 2
Figure 4.21 shows the magnetic hysteresis loop of CoFe2-xZnxO4 powders at room temperature, with a maximum applied field of up to 8 kOe. The saturated magnetization, remanence and coercivity are summarized in Table 4.10. Also, Figure 4.22 presented variations of saturated magnetization and coercivities for CoFe2-xZnxO4 powders as a function of compositions calcined at 900 ºC for 48 h. The magnetization value of doped samples increased sharply with the external magnetic field strength at the low field region. The highest saturated magnetization can be obtained in x = 0.1 Zn doped cobalt ferrites. Increasing in saturated magnetization can be attributed to influence of the cationic stoichiometry and its occupancy in specific sites. The magnetic order in the cubic system of ferromagnetic spinels was due to occurrence of the super-exchange interaction mechanism between metal ions in the tetrahedral A-site and octahedral B-site [20]. …show more content…
The net result, due to antiferromagnetic coupling, was an increase in magnetic moment on the B lattice and an increase in saturated magnetization. However, at high levels of zinc substitution in x > 0.1, the A-site magnetic ion becomes so diluted that coupling between the two lattices was lost, and the saturated magnetization drops [21]. Furthermore, the changes in coercivity of the samples by increasing the Zn content can be attributed to the magnetic character and anisotropic nature of cobalt. Magnetic anisotropy strongly affected the shape of the hysteresis loops and controls the

Similar Documents

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10