Feeds

Segway inventor builds shoe-controlled bionic arm

Kamen's vibro-limb tried out by US veterans

High performance access to file storage

Famous inventor Dean Kamen has developed a revolutionary new bionic arm for use by US troops injured in combat. The arm, now in beta testing, is manipulated from a foot-operated control panel inside one of the user's shoes and employs a vibrating feedback mechanism.

The DEKA prosthetic arm being trialled by the VA's Frederick Downs. Credit: DEKA

More useful than a Segway?

The new cyberlimb is built by DEKA, the tech R&D firm run by Dean Kamen of Segway and man-hurling cannon fame. It's being developed by Kamen for the US Veterans Administration (VA). The American Forces Press Service reports:

A unique feature of the advanced arm is its control system, which works almost like a foot-operated joystick. An array of sensors embedded in a shoe allows users to maneuver the arm by putting pressure on different parts of the foot. The current version uses wires to relay the signals to the arm, but future versions will be wireless. The arm also can be adapted to work with other control systems, including myoelectric switches, which are wired to residual nerves and muscles in the upper body and respond to movement impulses from the brain, shoulder joysticks or other conventional inputs.

The arm can apparently be fitted to a user with an arm missing "up to the shoulder" and is capable of reaching above the head, which the VA says is "a previously impossible maneuver for people with a prosthetic arm".

Another nifty feature is the arm's grip-strength feedback, provided using vibration. The wearer knows how forceful a grip the robotic hand is exerting by the strength of the arm's vibro signal felt in the stump.

The new cyber tech is now being tried out by suitably disabled US veterans. It's received glowing reviews already from Frederick Downs, chief of the VA’s Prosthetic and Sensory Aids Service, who lost an arm fighting in Vietnam. He says he was "brought to tears" by the experience of being able to smoothly lift and drink from a bottle using his new foot-operated arm.

“Learning to use the controls is not difficult,” according to Downs. The VA says that the arm lets users "pick up a key or hold a pencil". ®

High performance access to file storage

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.