'Locked-in' Patients Enabled To Communicate

Patients with absolutely no control over their body have finally been able to communicate, say scientists. A brain-computer interface was used to read the thoughts of patients to answer basic yes-or-no questions. One man was able to repeatedly refuse permission for his daughter to get married.

The study on four patients in Germany, published in PLOS Biology, also showed they were happy despite the effects of being "locked-in". 

The patients all had advanced forms of amyotrophic lateral sclerosis, in which the brain loses the ability to control muscles. It eventually traps people in their own body, they are able to think, but incapable of moving or talking.

When they become "locked in", it can still be possible to develop ways of communication using eye movements. But all the patients in the study were "completely locked in" and could not even move their eyes.

Trapped inside your own body

The activity of brain cells can change oxygen levels in the blood, which in turn changes the colour of the blood. And scientists were able to peer inside the brain using light to detect the blood's colour, through a technique called near-infrared spectroscopy. They then asked the patients yes-or-no questions such as: "Your husband's name is Joachim?" to train a computer to interpret the brain signals.

The system achieved an accuracy of about 75%.

It means questions need to be asked repeatedly in order to be certain of a patient's answer. Prof Ujwal Chaudhary, from the Wyss Center in Switzerland where the work was pioneered said: "It makes a great difference to their quality of life.

"Imagine if you had no means of communicating and then you could say yes or no - it makes a huge impact."

Insight

Patients who have recovered from locked-in syndrome say being able to communicate makes a huge difference.

Kate Allatt, became locked in for five months when she had a stroke at the age of 39. Unlike the patients in this study, she became able to communicate when her friends asked her to blink once for yes or twice for no. 

She told the BBC: "It was phenomenal, that moment if you could wrap every single Christmas, every single birthday, every single child you've ever held in your arms for the first time - that was how exciting it was."

In one case a daughter wanted the blessing of her completely locked-in father before marrying her boyfriend. But eight times out of 10 the answer came back no.

"We don't know why he said no," said Prof Chaudhary. "But they got married… nothing can come between love."

The form of communication is being used for more practical day-to-day means such as finding out if patients are in pain or want a family visit.

Prof John Donoghue, the director of the Wyss Centre, told the BBC: "If a person who is totally locked-in is able to communicate, you're freeing the mind to interact with the world around them.

"That is remarkable."

BBC:            Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants:   

U-Upload : Knowledge Straight To Your Brain:

 

« Big Data Analysis – Now Used For Politics…
US And UK Agree To Take On Islamic State In Cyberspace »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Slovak National Accreditation Service (SNAS)

Slovak National Accreditation Service (SNAS)

SNAS is the national accreditation body for Slovakia. The directory of members provides details of organisations offering certification services for ISO 27001.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

CyberSafe

CyberSafe

CyberSafe is a Portuguese company with a focus on cybersecurity solutions and services including network security, managed security, incident response and forensic analysis.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

GIS Consulting (GISPL)

GIS Consulting (GISPL)

From General Data Protection Regulations to advanced Network Infrastructure Audits, GIS Consulting has established a reputation as one the leading cyber security companies in the industry.