Feeds

'Biologically accurate' robot legs walk like an Egyptian

Or anyone else for that matter

Security for virtualized datacentres

Vid US boffins have come up with a pair of robotic legs that they reckon are the first to walk in a biologically accurate (if somewhat jerky) manner.

The researchers want to try to mimic the actual process of walking, particularly the bit where people don't actually have to think to do it, so they can figure out how babies learn to get around and possibly help spinal-cord-injury patients to regain the ability.

So for their robot trousers, the boffins put in simplified versions of the neural and musculoskeletal architecture and sensory feedback pathways that humans have.

The key to people walking is the central pattern generator, a neural network in the spinal cord that generates rhythmic muscle signals. The CPG works by picking up info from different parts of the body that are responding to the environment and using them to produce and control the rhythm.

The robotic legs use the simplest version of a CPG, a half-centre, which consists of just two neurones firing alternatively to set the rhythm, as well as sensors feeding into the half-centre. For example, load sensors use the force in the limb to tell when the leg is being pressed down for a step.

"Interestingly, we were able to produce a walking gait, without balance, which mimicked human walking with only a simple half-centre controlling the hips and a set of reflex responses controlling the lower limb," study co-author Dr Theresa Klein said in a canned statement.

The boffins now think that that might be how babies start out, with a simple half-centre, which would explain why they are able to show a walking pattern on a treadmill before they learn to walk. Over time, the baby then expends the network for more complex walking patterns.

"This underlying network may also form the core of the CPG and may explain how people with spinal cord injuries can regain walking ability if properly stimulated in the months after the injury," Klein added.

The University of Arizona researchers' study has been published in IOP's Journal of Neural Engineering. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Voyager 1 now EIGHTEEN LIGHT HOURS from home
Almost 20 BEEELION kilometres from Sol
HUGE SHARK as big as a WWII SUBMARINE died out, allowing whales to exist
Who'd win a fight: Megalodon or a German battleship?
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
ROGUE SAIL BOAT blocks SPACE STATION PODULE blastoff
Er, we think our ISS launch beats your fishing expedition
Comet Siding Spring revealed as flying molehill
Hiding from this space pimple isn't going to do humanity's reputation any good
BAE points electromagnetic projectile at US Army
Railguns for 'Future fighting vehicle'
LONG ARM of the SAUR: Brachially gifted dino bone conundrum solved
Deinocheirus mirificus was a bit of a knuckle dragger
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.