Smartphone Attachment Can Detect Cancer

Researchers at Washington State University have developed a portable sensor that uses a smartphone's camera to detect a biological indicator for several types of cancers with 99% accuracy, yielding laboratory quality results.

The sensor, a light spectrometer, can process up to eight blood or tissue samples at the same time (or one sample in eight wells) and can detect the human protein interleukin-6 (IL-6). That protein is a known biological marker for lung, prostate, liver, breast and epithelial cancers.

"At a time when patients and medical professionals expect always faster results, researchers are trying to translate bio-detection technologies used in laboratories to the field and clinic, so patients can get nearly instant diagnoses in a physician's office, an ambulance or the emergency room," the researchers said in a Statement.

A spectrometer analyses the amount and type of chemicals in a sample by measuring the light spectrum. The research was published in the journal Biosensors and Bioelectronics.

While smartphone spectrometers exist today, the WSU researchers said the eight-channel smartphone spectrometer is unique, and inexpensive to produce, about $150.

A custom smartphone multi-view app uses the phone's built-in camera and was developed to control the optical sensing parameters and to align each sample to the corresponding spectrometer channel. The captured images are converted into a spectrum in the visible wavelength range.

The initial cancer spectrometer was created for an iPhone 5, but it can be adjusted to work with any smartphone, according to Lei Li, an assistant professor in WSU's School of Mechanical and Materials Engineering. Li, who led the research team, also filed a provisional patent for the work.

"With our eight-channel spectrometer, we can put eight different samples to do the same test, or one sample in eight different wells to do eight different tests. 

This increases our device's efficiency," Li said.

Computerworld
 

« NATO Cyberwar: Establishing Rules Of Engagement
France Creates A Big Brother Data File »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

Falanx Cyber

Falanx Cyber

Falanx Cyber provides enterprise-class cyber security services and solutions. We deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Apollo Information Systems

Apollo Information Systems

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.