'Locked-in' Patients Enabled To Communicate

Patients with absolutely no control over their body have finally been able to communicate, say scientists. A brain-computer interface was used to read the thoughts of patients to answer basic yes-or-no questions. One man was able to repeatedly refuse permission for his daughter to get married.

The study on four patients in Germany, published in PLOS Biology, also showed they were happy despite the effects of being "locked-in". 

The patients all had advanced forms of amyotrophic lateral sclerosis, in which the brain loses the ability to control muscles. It eventually traps people in their own body, they are able to think, but incapable of moving or talking.

When they become "locked in", it can still be possible to develop ways of communication using eye movements. But all the patients in the study were "completely locked in" and could not even move their eyes.

Trapped inside your own body

The activity of brain cells can change oxygen levels in the blood, which in turn changes the colour of the blood. And scientists were able to peer inside the brain using light to detect the blood's colour, through a technique called near-infrared spectroscopy. They then asked the patients yes-or-no questions such as: "Your husband's name is Joachim?" to train a computer to interpret the brain signals.

The system achieved an accuracy of about 75%.

It means questions need to be asked repeatedly in order to be certain of a patient's answer. Prof Ujwal Chaudhary, from the Wyss Center in Switzerland where the work was pioneered said: "It makes a great difference to their quality of life.

"Imagine if you had no means of communicating and then you could say yes or no - it makes a huge impact."

Insight

Patients who have recovered from locked-in syndrome say being able to communicate makes a huge difference.

Kate Allatt, became locked in for five months when she had a stroke at the age of 39. Unlike the patients in this study, she became able to communicate when her friends asked her to blink once for yes or twice for no. 

She told the BBC: "It was phenomenal, that moment if you could wrap every single Christmas, every single birthday, every single child you've ever held in your arms for the first time - that was how exciting it was."

In one case a daughter wanted the blessing of her completely locked-in father before marrying her boyfriend. But eight times out of 10 the answer came back no.

"We don't know why he said no," said Prof Chaudhary. "But they got married… nothing can come between love."

The form of communication is being used for more practical day-to-day means such as finding out if patients are in pain or want a family visit.

Prof John Donoghue, the director of the Wyss Centre, told the BBC: "If a person who is totally locked-in is able to communicate, you're freeing the mind to interact with the world around them.

"That is remarkable."

BBC:            Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants:   

U-Upload : Knowledge Straight To Your Brain:

 

« Big Data Analysis – Now Used For Politics…
US And UK Agree To Take On Islamic State In Cyberspace »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.