Toggle light / dark theme

Researchers at the Georgia Institute of Technology have found a detection method that could revolutionize cancer treatment by showing how cancers metastasize and what stage they are.

Cancer spreads via circulating (CTCs) that travel through the blood to other organs, and they are nearly impossible to track. Now, researchers at the Georgia Institute of Technology have found a detection method that could revolutionize by showing how cancers metastasize and what stage they are. This could lead to earlier and more targeted treatment, beginning with a simple blood test.

When a tumor starts metastasizing, it sheds its cell into the blood. An individual cell often doesn’t survive the bloodstream on its own, but clusters of cells are much more robust and can travel to other organs, effectively pushing the cancer to a metastatic state.

A pair of UCLA bioengineers and a former postdoctoral scholar have developed a new class of bionic 3D camera systems that can mimic flies’ multiview vision and bats’ natural sonar sensing, resulting in multidimensional imaging with extraordinary depth range that can also scan through blind spots.

Powered by computational image processing, the camera can decipher the size and shape of objects hidden around corners or behind other items. The technology could be incorporated into autonomous vehicles or medical imaging tools with sensing capabilities far beyond what is considered state of the art today. This research has been published in Nature Communications.

In the dark, bats can visualize a vibrant picture of their surroundings by using a form of echolocation, or sonar. Their high-frequency squeaks bounce off their surroundings and are picked back up by their ears. The minuscule differences in how long it takes for the echo to reach the nocturnal animals and the intensity of the sound tell them in real time where things are, what’s in the way and the proximity of potential prey.

Researchers have observed the formation of 2D ice on gold surfaces that were thought to be too hydrophilic and too rough to support this type of ice.


Mobile devices use facial recognition technology to help users quickly and securely unlock their phones, make a financial transaction or access medical records. But facial recognition technologies that employ a specific user-detection method are highly vulnerable to deepfake-based attacks that could lead to significant security concerns for users and applications, according to new research involving the Penn State College of Information Sciences and Technology.

Mobile devices use facial recognition technology to help users quickly and securely unlock their phones, make a financial transaction or access medical records. But facial recognition technologies that employ a specific user-detection method are highly vulnerable to deepfake-based attacks that could lead to significant security concerns for users and applications, according to new research involving the Penn State College of Information Sciences and Technology.

The researchers found that most that use facial liveness verification—a feature of that uses computer vision to confirm the presence of a live user—don’t always detect digitally altered photos or videos of individuals made to look like a live version of someone else, also known as deepfakes. Applications that do use these detection measures are also significantly less effective at identifying deepfakes than what the app provider has claimed.

“In recent years we have observed significant development of facial authentication and verification technologies, which have been deployed in many security-critical applications,” said Ting Wang, associate professor of information sciences and technology and one principal investigator on the project. “Meanwhile, we have also seen substantial advances in deepfake technologies, making it fairly easy to synthesize live-looking facial images and video at little cost. We thus ask the interesting question: Is it possible for malicious attackers to misuse deepfakes to fool the facial verification systems?”

Youtube Short: 27 seconds.

The #medical #university of South Carolina and the University of Florida have shown the first non-invasive visualization of the #brain waste disposal clearance system in real time.

Abstract: #nature Communications:

McKnight Brain Institute University of Florida: https://mbi.ufl.edu/2022/01/18/mri-study-unveils-key-details…al-system/

Soft robots that can complete tasks with high efficiency, accuracy and precision could have numerous valuable applications. For instance, they could be introduced in medical settings, helping doctors to carry out complex surgical procedures or assisting elderly and vulnerable patients during rehabilitation.

Soft robots are more flexible and can deform more. This can result in an increased dexterity (i.e., better manual skills when completing tasks), as well as in a reduction of payload (i.e., the capacity to carry a load), because they can produce smaller forces than rigid robotic systems.

Researchers at National University of Singapore and Beijing Jiaotong University have recently developed a new rod-driven soft robot (RDSR) that operates through push and pull movements. This robot, presented in a paper published in the IEEE Robotics and Automation Letters, combines the mechanisms of two previously created by members of the research group.

It’s “a revolutionary scientific advance in molecular data storage and cryptography.”


Scientists from the University of Texas at Austin sent a letter to colleagues in Massachusetts with a secret message: an encryption key to unlock a text file of L. Frank Baum’s classic novel The Wonderful Wizard of Oz. The twist: The encryption key was hidden in a special ink laced with polymers, They described their work in a recent paper published in the journal ACS Central Science.

When it comes to alternative means for data storage and retrieval, the goal is to store data in the smallest amount of space in a durable and readable format. Among polymers, DNA has long been the front runner in that regard. As we’ve reported previously, DNA has four chemical building blocks—adenine (A), thymine (T), guanine (G), and cytosine ©—which constitute a type of code. Information can be stored in DNA by converting the data from binary code to a base-4 code and assigning it one of the four letters. A single gram of DNA can represent nearly 1 billion terabytes (1 zettabyte) of data. And the stored data can be preserved for long periods—decades, or even centuries.

There have been some inventive twists on the basic method for DNA storage in recent years. For instance, in 2019, scientists successfully fabricated a 3D-printed version of the Stanford bunny—a common test model in 3D computer graphics—that stored the printing instructions to reproduce the bunny. The bunny holds about 100 kilobytes of data, thanks to the addition of DNA-containing nanobeads to the plastic used to 3D print it. And scientists at the University of Washington recently recorded K-Pop lyrics directly onto living cells using a “DNA typewriter.”