'Locked-in' Patients Enabled To Communicate

Patients with absolutely no control over their body have finally been able to communicate, say scientists. A brain-computer interface was used to read the thoughts of patients to answer basic yes-or-no questions. One man was able to repeatedly refuse permission for his daughter to get married.

The study on four patients in Germany, published in PLOS Biology, also showed they were happy despite the effects of being "locked-in". 

The patients all had advanced forms of amyotrophic lateral sclerosis, in which the brain loses the ability to control muscles. It eventually traps people in their own body, they are able to think, but incapable of moving or talking.

When they become "locked in", it can still be possible to develop ways of communication using eye movements. But all the patients in the study were "completely locked in" and could not even move their eyes.

Trapped inside your own body

The activity of brain cells can change oxygen levels in the blood, which in turn changes the colour of the blood. And scientists were able to peer inside the brain using light to detect the blood's colour, through a technique called near-infrared spectroscopy. They then asked the patients yes-or-no questions such as: "Your husband's name is Joachim?" to train a computer to interpret the brain signals.

The system achieved an accuracy of about 75%.

It means questions need to be asked repeatedly in order to be certain of a patient's answer. Prof Ujwal Chaudhary, from the Wyss Center in Switzerland where the work was pioneered said: "It makes a great difference to their quality of life.

"Imagine if you had no means of communicating and then you could say yes or no - it makes a huge impact."

Insight

Patients who have recovered from locked-in syndrome say being able to communicate makes a huge difference.

Kate Allatt, became locked in for five months when she had a stroke at the age of 39. Unlike the patients in this study, she became able to communicate when her friends asked her to blink once for yes or twice for no. 

She told the BBC: "It was phenomenal, that moment if you could wrap every single Christmas, every single birthday, every single child you've ever held in your arms for the first time - that was how exciting it was."

In one case a daughter wanted the blessing of her completely locked-in father before marrying her boyfriend. But eight times out of 10 the answer came back no.

"We don't know why he said no," said Prof Chaudhary. "But they got married… nothing can come between love."

The form of communication is being used for more practical day-to-day means such as finding out if patients are in pain or want a family visit.

Prof John Donoghue, the director of the Wyss Centre, told the BBC: "If a person who is totally locked-in is able to communicate, you're freeing the mind to interact with the world around them.

"That is remarkable."

BBC:            Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants:   

U-Upload : Knowledge Straight To Your Brain:

 

« Big Data Analysis – Now Used For Politics…
US And UK Agree To Take On Islamic State In Cyberspace »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.