Feeds

Berkeley boffins crack brain wave code

Electrical signals used to recreate sound heard by test subjects

New hybrid storage solutions

Scientists have reconstructed the words people hear by using a computer algorithm to decode electrical signals in the brain.

Eggheads at the University of California in Berkeley fastened electrodes onto the bare brains of patients undergoing neurosurgery. The scientists were studying the superior temporal gyrus (ridge on the cerebral cortex), the area thought to play a crucial role in comprehending the sounds we hear.

During surgery, patients were played recordings of people speaking. As the patients' brains processed the auditory information, the electrodes attached to their brains transmitted electrical signals into a computer. Software then calculated how the subjects' brains responded according to the speech frequencies they heard. It could therefore reproduce a sound close enough to the original word for the researchers to guess the word better than chance.

The study shows that one day people like Stephen Hawking may be able to upgrade the speech software they use to technology that can process their very thoughts.

“This is huge for patients who have damage to their speech mechanisms because of a stroke or Lou Gehrig's disease and can't speak," said Robert Knight, professor of psychology and neuroscience, and lead author of the study, published in PLoS Biology. "If you could eventually reconstruct imagined conversations from brain activity, thousands of people could benefit."

The research is based on a study of only 15 people and the technique cannot yet read imagined speech. Understanding that is the next step, says Brian Pasley, a post-doctoral researcher who worked on the project.

"This research is based on sounds a person actually hears, but to use this for a prosthetic device, these principles would have to apply to someone who is imagining speech," Pasley said in a statement.

"There is some evidence that perception and imagery may be pretty similar in the brain. If you can understand the relationship well enough between the brain recordings and sound, you could either synthesise the actual sound a person is thinking, or just write out the words with a type of interface device."

The team behind the research is fighting the suggestion that subsequent technology based on this procedure could be used with malign intent. For the moment, the technique works only on patients who are undergoing neurosurgery and willing to have 256 electrodes attached to their exposed brains.

“How Dr Strangelove might use this in the future is slightly above my pay grade,” Knight said. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Thought that last dinosaur was BIG? This one's bloody ENORMOUS
Weighed several adult elephants, contend boffins
Chelyabinsk-sized SURPRISE asteroid to skim Earth, satnav birds
Space rock appears out of nowhere, buzzes planet on Sunday
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet
Probe prepares to make first landing on fast-moving rock
Square Kilometre Array reveals its 1.6TB-a-day storage and network rigs
Boolardy Engineering Test Array - aka BETA - is about to come out of Beta
LOHAN invites ENTIRE REG READERSHIP to New Mexico shindig
Well, those of you who back our Kickstarter tin-rattling...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.