Feeds

MIT touts new mind-to-machine algorithm

Unifying, but not universal, approach

Intelligent flash storage arrays

Boffins at MIT are getting ever closer to a direct mind-to-machine link that would translate a person's thoughts into instructions for a machine. The university is developing the technology so a paralysed person might be able to operate a prosthetic purely by using their mind.

There are lots of teams working in similar areas. The notion that brain activity should be monitored and used to derive a person's intentions is not new. But MIT says its algorithm will work with all the rest of the research that has already been done, rather than adding a new technique to the pile.

Lakshminarayan "Ram" Srinivasan, lead author of a paper on the subject, said: "The work represents an important advance in our understanding of how to construct algorithms in neural prosthetic devices for people who cannot move to act or speak...we don't need to reinvent a new paradigm for each modality or brain region."

The graphical model being developed by the MIT researchers would work regardless of which measurement technique is used, he explained.

That being said, there is still work to do before we get to the stage of "thinking" our cars, or entrusting the flying of planes to a brain-to-machine link.

"Translating an algorithm into a fully functioning clinical device will require a great deal of work, but also represents an intriguing road of scientific and engineering development for the years to come," MIT said.

More here. ®

Remote control for virtualized desktops

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.