Skip to main content

Brain Machine Interfece

Brain-Computer Interface (BCI)  are devices that enable its users to interact with computers by mean of brain-activity only, this activity being generally measured by ElectroEncephaloGraphy (EEG).Electroencephalography (EEG) is a physiological method of choice to record the electrical activity generated by the brain via electrodes placed on the scalp surface.Functional magnetic resonance imaging (fMRI) measures brain activity by detecting changes associated with blood flow.
The reason a BCI works at all is because of the way our brains function. Our brains are filled with neurons, individual nerve cells connected to one another by dendrites and axons. Every time we think, move, feel or remember something, our neurons are at work. That work is carried out by small electric signals that zip from neuron to neuron as fast as 250 mph . The signals are generated by differences in electric potential carried by ions on the membrane of each neuron.Although the paths the signals take are insulated by something called myelin, some of the electric signal escapes. Scientists can detect those signals, interpret what they mean and use them to direct a device of some kind.


                    Image result for brain computer interface
                               

Electroencephalograph (EEG) is attached to the scalp. The electrodes can read brain signals. However, the skull blocks a lot of the electrical signal, and it distorts what does get through.To get a higher-resolution signal, scientists can implant electrodes directly into the gray matter of the brain itself, or on the surface of the brain, beneath the skull. This allows for much more direct reception of electric signals and allows electrode placement in the specific area of the brain where the appropriate signals are generated. Regardless of the location of the electrodes, the basic mechanism is the same: The electrodes measure minute differences in the voltage between neurons. The signal is then amplified and filtered. In current BCI systems, it is then interpreted by a computer program, although you might be familiar with older analogue encephalographs, which displayed the signals via pens that automatically wrote out the patterns on a continuous sheet of paper.
In the case of a sensory input BCI, the function happens in reverse. A computer converts a signal, such as one from a video camera, into the voltages necessary to trigger neurons. The signals are sent to an implant in the proper area of the brain, and if everything works correctly, the neurons fire and the subject receives a visual image corresponding to what the camera sees.

 Some of the applications of this technology may seem frivolous, such as the ability to control a video game by thought. If you think a remote control is convenient, imagine changing channels with your mind , devices that would allow severely disabled people to function independently or something as basic as controlling a computer cursor via mental commands

                              
                        Image result for brain computer interface

Comments

Popular posts from this blog

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...

8 TECH SUPPORT STORIES. A MUST READ!

MOVE THE MOUSE! I asked a user to move her mouse all the way to the right. They picked up the mouse physically and put it on the right side of her desk. RIGHT CLICK! I told the user to right click on the desktop to select properties. She replied that nothing was happening. I asked her again to do the same. She replied with the same answer. When I went to her desk, she had written the word CLICK on a paper on her desk. LAPTOP NOT WORKING! A user was once shouting at me that her laptop was not working even though she hit the keys and tried the touch pad. I run down to her, she shows her laptop still shouting that I wasn’t working properly and couldn’t do my job etc. I look at her laptop, switch it on, turn around and leave the room. OUTAGE PROBLEM! A user once asked if they could download “download the Internet” in case there was a power outage and they could still use it. COMPUTER WON’T TURN ON! Once, a user said that her computer won’t turn on. I asked her to check ...

HOW TO SEE INCOGNITO HISTORY AND DELETE IT

We have heard about private or incognito browsing. It’s the mode that doesn’t store anything in history. While it does store cookies, but are deleted after the session is exited. This mode is known as Incognito browsing in Google Chrome, Private Browsing in Mozilla Firefox, and InPrivate Browsing in Internet Explorer. Whatever we may want to call it, the mode works the same in all browsers. However, sometimes we might want to go back to a page that you previously opened. The question is – can you check your incognito history? Problem is, there is no easy way to go back to that page. So all are search queries we saw is effectively lost. Unless you can Google it up and it shows again. But if it’s not there on the first page of Google, it’s gone forever. But we can still get to know about the websites that have been browsed under the incognito mode. Yes, the private browsing mode has a loophole. You can see the browsing history of someone using incognito mode but only if you h...