Skip to main content

Think your kid might have an ear infection? This app can confirm it

Image used with permission by copyright holder

You may have heard about artificial intelligence algorithms which can smell diseases, such as Parkinson’s, Crohn’s or even liver failure. But here’s a new one: An A.I. smartphone app that’s able to hear ear infections.

That’s something a team of researchers from the University of Washington have been working to develop. It works by detecting fluid behind the eardrum by using a smartphone’s microphone and speaker, combined with an ordinary piece of paper. The app works by producing a series of soft “chirps,” between 1 to 4 kHz, which are played into the patient’s ear through a small paper funnel. Depending on how these sounds are reflected back to the phone, the app is able to detect the likelihood of fluid behind the eardrum with 85% accuracy. That figure is the same as the specialist tools doctors currently use to detect fluid in the middle ear.

“At a high level, it is like tapping a wine glass,” Shyam Gollakota, an associate professor in the University of Washington’s Allen School of Computer Science and Engineering, told Digital Trends. “Depending on how much liquid is in it, you get different sounds. In our case, we are not tapping but sending sounds, and using machine learning on these sounds to detect the presence of liquid.”

The work is particularly focused on diagnosing ear infections in kids. Ear infections are the most common reason for parents bring their children to see a pediatrician, according to the National Institutes of Health. The researchers on the project evaluated their system at the Seattle Children’s Hospital surgical centers by testing it on 98 pediatric patients, aged between 9 months and 17 years.

“The definitive way to know if there is fluid is to make an incision in the eardrum,” Gollakota explained. “We evaluated our system with patients who were undergoing ear tube placement, during which an incision is made in the eardrum to drain any fluid. We used our smartphone system on the morning of the ear tube surgery and compared the results with the ground truth of what happened during surgery.”

The team has started up a healthcare company, Edus Health, which will distribute the app and make it widely available. “We have our app running in real time on a smartphone, and we are planning on obtaining FDA approval by the end of the year,” Gollakota said. The app works across a range of smartphone models, so long as the devices have co-located microphone and speakers. “[This] is true for almost every smartphone,” he said.

Editors' Recommendations

Luke Dormehl
I'm a UK-based tech writer covering Cool Tech at Digital Trends. I've also written for Fast Company, Wired, the Guardian…
Forget fingerprints. These headphones can scan your ear canal for identification
earecho ear canal biometrics scanning headphones

Passwords kind of suck. Or, rather, people kind of suck at passwords. Even after the plethora of cyber-attacks people have witnessed in recent years, the most commonly used password in 2019 is “123456.” “Qwerty” and “password” follow in quick succession. In a time when our lives are more digitized than ever, when an account being breached risks exposing everything from our banking information to our health records, that’s a problem. And it’s one that researchers have been trying to solve for years.

This is where biometric security systems come into play. Biometrics’ big promise is to replace the typed security systems of yesteryear with new types of body-based identification that require the user to… well, just be who they say they are. Instead of requiring extrinsic tokens, such as a memorized password or a physical keycard, a biometrics system identifies people the way that people identify one another: through intrinsic qualities like appearance, voice, or even the way a person walks.

Read more
Your favorite calendar apps can also get spam. Here’s how to block or report it
calendar on iPad next to macbook and mac keyboard

It turns out emails aren’t the only form of spam you need to worry about. There’s a not-so-new form of spam that has recently resurfaced that targets your favorite calendar apps. Calendar spam is a form of phishing in which spammy calendar events and invites are sent to you via your calendar service (like Google Calendar or iCloud calendar). These spammy calendar events usually feature phishing links that when clicked on may prompt you to divulge sensitive financial information.

Security firm Kaspersky first noted this form of spam in a blog post published on Monday, June 10. In a brief description of calendar spam, as it occurs in Google Calendar, Kaspersky also mentioned that, in addition to phishing links, calendar spam can also show up as fake polls in Google Calendar.

Read more
Robocall-blocking apps might be sending your private data to third parties
cell phone companies stop robocalls after fcc vote robo calls feat

If you get a ton of robocalls, installing an app promising to block them might sound like a good idea. Robocalls are a huge problem, and a blocker seems like a quick and easy solution for improving the situation. Turns out, the apps might be violating your privacy starting from the second you open them.
A security consultant for the cybersecurity firm NCC Group took a look at some of the most popular robocall-blocking apps, and found a number of privacy violations, TechCrunch reports.
The apps they looked at include TrapCall, Hiya, and Truecaller. According to the firm, the apps will send user and/or device data to third-party analytics companies with the intent of monetizing your data, without asking for your expressed consent to do so. In many cases that information was also transmitted before a user was presented with the app’s privacy policy.
According to the firm, those apps are in violation of Apple’s guidelines which require an app to gain permission from a user before it sends any data to third parties.
The consultant argues that most smartphone users don’t have a technical background and are not able to tell what information is being shared with third parties. A privacy policy, which let’s face it most people don’t read, it really the only chance a user has to know where their information is being shared.
NCC Group contacted all of the apps in question about the privacy issues, but none of them made any changes until the group contacted Apple, after which TrapCall updated its privacy policy. Truecaller has reportedly since fixed the issue that allowed data to be sent when the app is opened.
Robocalls are becoming an increasingly larger problem for cell phone users. In June, the Federal Communications Commission (FCC) voted to allow companies to block robocalls by default.
All of the major carriers in the United States currently offer some form of robocall blocking; however, customers have to opt-in for those services. The new FCC regulations allow carriers to block those calls without a user expressly opting in for them to do so -- though some wireless providers will now charge you for the privilege. 

Read more