'Locked-in' Patients Enabled To Communicate

Patients with absolutely no control over their body have finally been able to communicate, say scientists. A brain-computer interface was used to read the thoughts of patients to answer basic yes-or-no questions. One man was able to repeatedly refuse permission for his daughter to get married.

The study on four patients in Germany, published in PLOS Biology, also showed they were happy despite the effects of being "locked-in". 

The patients all had advanced forms of amyotrophic lateral sclerosis, in which the brain loses the ability to control muscles. It eventually traps people in their own body, they are able to think, but incapable of moving or talking.

When they become "locked in", it can still be possible to develop ways of communication using eye movements. But all the patients in the study were "completely locked in" and could not even move their eyes.

Trapped inside your own body

The activity of brain cells can change oxygen levels in the blood, which in turn changes the colour of the blood. And scientists were able to peer inside the brain using light to detect the blood's colour, through a technique called near-infrared spectroscopy. They then asked the patients yes-or-no questions such as: "Your husband's name is Joachim?" to train a computer to interpret the brain signals.

The system achieved an accuracy of about 75%.

It means questions need to be asked repeatedly in order to be certain of a patient's answer. Prof Ujwal Chaudhary, from the Wyss Center in Switzerland where the work was pioneered said: "It makes a great difference to their quality of life.

"Imagine if you had no means of communicating and then you could say yes or no - it makes a huge impact."

Insight

Patients who have recovered from locked-in syndrome say being able to communicate makes a huge difference.

Kate Allatt, became locked in for five months when she had a stroke at the age of 39. Unlike the patients in this study, she became able to communicate when her friends asked her to blink once for yes or twice for no. 

She told the BBC: "It was phenomenal, that moment if you could wrap every single Christmas, every single birthday, every single child you've ever held in your arms for the first time - that was how exciting it was."

In one case a daughter wanted the blessing of her completely locked-in father before marrying her boyfriend. But eight times out of 10 the answer came back no.

"We don't know why he said no," said Prof Chaudhary. "But they got married… nothing can come between love."

The form of communication is being used for more practical day-to-day means such as finding out if patients are in pain or want a family visit.

Prof John Donoghue, the director of the Wyss Centre, told the BBC: "If a person who is totally locked-in is able to communicate, you're freeing the mind to interact with the world around them.

"That is remarkable."

BBC:            Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants:   

U-Upload : Knowledge Straight To Your Brain:

 

« Big Data Analysis – Now Used For Politics…
US And UK Agree To Take On Islamic State In Cyberspace »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.

DefectDojo

DefectDojo

DefectDojo is a DevSecOps and vulnerability management tool.