Smartphone Attachment Can Detect Cancer

Researchers at Washington State University have developed a portable sensor that uses a smartphone's camera to detect a biological indicator for several types of cancers with 99% accuracy, yielding laboratory quality results.

The sensor, a light spectrometer, can process up to eight blood or tissue samples at the same time (or one sample in eight wells) and can detect the human protein interleukin-6 (IL-6). That protein is a known biological marker for lung, prostate, liver, breast and epithelial cancers.

"At a time when patients and medical professionals expect always faster results, researchers are trying to translate bio-detection technologies used in laboratories to the field and clinic, so patients can get nearly instant diagnoses in a physician's office, an ambulance or the emergency room," the researchers said in a Statement.

A spectrometer analyses the amount and type of chemicals in a sample by measuring the light spectrum. The research was published in the journal Biosensors and Bioelectronics.

While smartphone spectrometers exist today, the WSU researchers said the eight-channel smartphone spectrometer is unique, and inexpensive to produce, about $150.

A custom smartphone multi-view app uses the phone's built-in camera and was developed to control the optical sensing parameters and to align each sample to the corresponding spectrometer channel. The captured images are converted into a spectrum in the visible wavelength range.

The initial cancer spectrometer was created for an iPhone 5, but it can be adjusted to work with any smartphone, according to Lei Li, an assistant professor in WSU's School of Mechanical and Materials Engineering. Li, who led the research team, also filed a provisional patent for the work.

"With our eight-channel spectrometer, we can put eight different samples to do the same test, or one sample in eight different wells to do eight different tests. 

This increases our device's efficiency," Li said.

Computerworld
 

« NATO Cyberwar: Establishing Rules Of Engagement
France Creates A Big Brother Data File »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

ArcusTeam

ArcusTeam

ArcusTeam is at the forefront of the firmware and applications security industry, with a mission to increase the level of security on all IoT devices and applications.

CertiK

CertiK

CertiK uses rigorous Formal Verification technology to provide hacker-resistant smart contract and blockchain audits, thorough penetration testing, and customized security integrations.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Elemental Cyber Security

Elemental Cyber Security

Elemental is a game changing cyber security compliance automation and enforcement technology provider.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Cyber Intell Solution (CIS)

Cyber Intell Solution (CIS)

Cyber Intell Solution provide expert consulting, specialized products, and tailored operational services to governmental and corporate industry worldwide.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.