Feeds

US team explains near death experiences

'REM intrusion' fingered

Build a business case: developing custom apps

A team of US scientists has come up with a plausible explanation for "near death" events, wherein individuals experience out-of-body sensations or an aura of clear white light - and it has nothing to do with ascending toward the pearly gates.

Rather, it's all down to "REM intrusion" where "the same parts of the brain are activated when people dream as in near death experiences", the BBC reports.

The University of Kentucky team studied 55 people who'd had near death experiences - defined as "a time during a life-threatening episode when a person undergoes an outer body experience, unusual alertness, sees an intense light, or feels a great sense of peace" - and compared them to 55 who hadn't.

Sixty per cent of those who claimed a near death experience said they'd also suffered a "REM state of sleep during periods of wakefulness", or REM intrusion, described by study author professor Kevin Nelson to the Daily Telegraph as "an activation of certain brain regions that are also active during the dream state".

Nelson added: "However, I hesitate to call it dreaming or dreaming while awake. This is the first testable hypothesis of a biological basis for these experiences. People who have near death experiences may have an arousal system that predisposes them to REM intrusion."

The theory has found favour with Dr Neil Stanley, director of sleep research at Surrey University, who chipped in: "There are plenty of rational people who say that these things happen and the one part of us that's utterly fantastical is our dreams.

"Our dreams can appear incredibly real - after all they are our reality when they are happening. If you get that sort of reality playing through into your consciousness, it's a very convincing reason to believe such a thing is happening."

For the record, common symptoms of REM intrusion include "waking up and feeling unable to move, having sudden muscle weakness in the legs, and hearing sounds just before falling asleep or waking up that others do not hear", the Kentucky team notes.

There's more in the full study, as published in Neurology. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Jurassic squawk: Dinos were Earth's early FEATHERED friends
Boffins research: Ancient dinos may all have had 'potential' fluff
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.