Wearable Technology To Monitor Disease

Wearable Technology To Monitor Disease

Wearable Technology To Monitor Disease

Technology has something for everything these days, now even disease monitoring. A wearable vapor sensor that is currently under development at the University of Michigan might just offer disease monitoring continuously for patients who have diabetes, lung disease, anemia and high blood pressure. The market for wearable technology itself is exploding and expected to go up to $14 billion by the next four years or so.

The sensor will be able to detect chemicals that are airborne, from either being released through the skin or exhaled from the lungs, and will most likely be one of the first, if not the only, piece of wearable technology that will be able to pick up on a broad array of not physical, but chemical attributes. The researchers at the University of Michigan are working together with the National Science Foundation’s Innovation Corps program for the purpose of moving the gadget out of the labs and into the market.

When it comes to wearable technology, everything that could ever be done, is about to get done. Technology has come a long way, from the first ever computer all the way to a piece of technology that can be worn to monitor someone who has issues with their diabetes. The world we live in is truly extraordinary, and technology has yet to slow down.

Each disease that can be detected by the device has its own special biomarker, such as acetone for diabetes. It will also be able to detect oxygen and nitric oxide and abnormal levels overall which could further pinpoint lung disease, anemia and high blood pressure, to name a few. The sensor will also be able to identify a broader array of chemicals as well. The sensor is being developed by Fan and Zhaohui Zhong, who is an associate professor of computer engineering and electrical, as well Girish Kulkarni, who is a doctoral candidate in electrical engineering. The researchers have said that the device is smaller, more reliable and faster than the counterparts that are too bulky and big to be worn.

The sensor also has applications that have the ability to register and notify of a hazardous chemical presence in places like a lab, or public area. This application alone could save lives, and will prove itself to be extremely beneficial to those who work in careers or industries that are surrounded by chemicals. Once the sensor has detected a chemical leak, data about the overall air quality will be provided.

With our platform technology,” says Zhong, “we are able to measure a wide variety of chemicals at the same time, or modify the device to target specific chemicals. There are limitless possibilities here.

The researchers, to create this piece of technology, took an extremely unique approach when it comes to detecting molecules. Kulkarni says that, “Nanoelectronic sensors typically depend on detecting charge transfer between the sensor and a select molecule that is currently in the air at the time, or in the solution.”

By Linda Green

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…