Browse Definitions:
Definition

superconducting quantum interference device

A superconducting quantum interference device (SQUID) is a mechanism used to measure extremely weak signals, such as subtle changes in the human body's electromagnetic energy field. Using a device called a Josephson junction, a SQUID can detect a change of energy as much as 100 billion times weaker than the electromagnetic energy that moves a compass needle. A Josephson junction is made up of two superconductors, separated by an insulating layer so thin that electrons can pass through. A SQUID consists of tiny loops of superconductors employing Josephson junctions to achieve superposition: each electron moves simultaneously in both directions. Because the current is moving in two opposite directions, the electrons have the ability to perform as qubits (that theoretically could be used to enable quantum computing). SQUIDs have been used for a variety of testing purposes that demand extreme sensitivity, including engineering, medical, and geological equipment. Because they measure changes in a magnetic field with such sensitivity, they do not have to come in contact with a system that they are testing.

SQUIDs are usually made of either a lead alloy (with 10% gold or indium) and/or niobium, often consisting of the tunnel barrier sandwiched between a base electrode of niobium and the top electrode of lead alloy. A radio frequency (RF) SQUID is made up of one Josephson junction, which is mounted on a superconducting ring. An oscillating current is applied to an external circuit, whose voltage changes as an effect of the interaction between it and the ring. The magnetic flux is then measured. A direct current (DC) SQUID, which is much more sensitive, consists of two Josephson junctions employed in parallel so that electrons tunneling through the junctions demonstrate quantum interference, dependent upon the strength of the magnetic field within a loop. DC SQUIDs demonstrate resistance in response to even tiny variations in a magnetic field, which is the capacity that enables detection of such minute changes.

One of the device's most promising uses is in magnetoencephalography (MEG), the process of measuring magnetic fields to enable brain imaging. Physical processes, such as muscular or neural activity, in humans (and other animals) create magnetic fields as small as a thousand billionth of a tesla (as a comparison, a fridge magnet generates about a tenth of a tesla). DC SQUIDs, contained in a helmet-like device, measure the currents created by neural activity. The possible SQUID neuroscience applications are myriad. A recent study used SQUID-enabled magnetoencephalography to measure the surprisingly large level of activity in consumer's brains that is evoked by choosing between (for example) brands of ketchup.

This was last updated in April 2007

Continue Reading About superconducting quantum interference device

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close