This website uses cookies to ensure you have the best experience. Learn more

Using Electroencephalography As A Method Of Computer Input

1365 words - 5 pages

Abstract — There are a number of people in the world who suffer from disabilities which prevent them from being able to use traditional means to control a computer. For these people, alternate forms of input are required. One potential input device is an Electroencephalography machine which can be used to detect patterns of brain activity and use these patterns to trigger events on a computer such as mouse clicks or keyboard presses. This allows those without the use of their hands to be able to control a computer without invasive surgery.

I. INTRODUCTION
Electroencephalography or EEG is a technique which uses electrodes to detect and amplify the electrical potential which corresponds to the firing of neurons in the brain. Although each neuron produces its own signal when it fires, it is nearly impossible to detect the activity of a single neuron via EEG. Instead, the firing of thousands of neurons in a pattern produce a signal which is strong enough to be picked up via electrodes placed on the scalp. These patterns can be used to analyse and diagnose mental conditions such as epilepsy, to monitor and observe brain responses to external stimuli, or as a potential means of hands-free control over a system.


Fig. 1 One Second of EEG Signal [2]

Clinical Electroencephalograph devices use a particular electrode placement known as ‘The International 10-20 System for Placing Electrodes’, or simply the 10-20 system. This method was developed in order to standardize the placement of electrodes on the scalp so that studies could be reproduced easily. The name comes from the fact that the distance between electrodes is either 10% or 20% away from each other. The layout of the 10-20 system is shown in Figure 1.


Fig. 2 The 10-20 International System for placing electrodes [4]

EEG signals are typically described in terms of (1) rhythmic activity and (2) transients [2]. The rhythmic activity consists of periodic waves of a particular frequency. Most EEG signals fall in between the ranges of 1Hz and 30Hz. These frequencies are broken down into specific bands, each of which pertains to a specific segment of mental activity.

Type Frequency Range (Hz) Normally
Delta 1Hz – 4Hz Slow wave sleep
Theta 4Hz – 7Hz Drowsiness
Alpha 8Hz – 12Hz Relaxation
Beta 12Hz – 30Hz Concentration
Fig. 3 Comparison of EEG Bands [2]

Rhythmic EEG activity consists of the standard electrical activity being generated by the brain. Peak activity generally falls into one of the four spectrum bands as listed above. For example, when the user is relaxed, there will be a peak of activity somewhere in between 8Hz and 12Hz. This makes it possible to determine when a person is relaxed or when they are concentrating based on the primary frequency in the signal.

Transient activity on an EEG is activity which is caused by temporary events such as seizures. Muscle movement such as the blinking of an eye, or the movement of facial muscles can also produce temporary...

Find Another Essay On Using Electroencephalography as a Method of Computer Input

The Scarlet Letter as a Method of Understanding Characters

1071 words - 4 pages The Scarlet Letter as a Method of Understanding CharactersIn The Scarlet Letter, Hawthorne uses his characters' reactions to the scarlet letter to illustrate society's influence on the beliefs of individuals. Generally, the individual will adopt the beliefs of those around him, but if a person is mistreated by, or separated from, the community, this tendency can be curtailed. The typical Bostonian treats the scarlet letter simply as a symbol of

Religion as a Method of Improvement for Gender Equality

1950 words - 8 pages Religion as a Method of Improvement for Gender Equality Although women were still viewed and treated as second-class citizens, the status of women seemed improve under Christianity, especially in regard to social interaction and Islam, especially in regard to legal rights such as inheritance laws. The improvement of women’s situation was particularly pronounced when compared to the even lesser status of women during the Greek and Roman periods

Determinations of the Protein Concentration of a Cell Extract Using the 'Bradford Method'

683 words - 3 pages DETERMINATIONS OF THE PROTEIN CONCENTRATION OF A CELL EXTRACT USING THE 'BRADFORD METHOD'.CBDP21LFS0028PRACTICAL GROUP E14TH OCTOBER 2008ABSTRACTThe aim of the experiment is to find out the concentration of cell extracts (Bovine Serum Albumin, BSA) using the Bradford method. Stock solution of BSA was made by diluting the protein solution to prepare concentrations ranging from 0.0mg/cm3 to 1.0mg/cm3 (Peck, 1998). 5cm3 of the Bradford dye reagent

Accuracy of data input is important. What method of data input would be best for each of the following situations and explain why?

1243 words - 5 pages , editing, and formatting as needed (because one of the drawbacks to a keyboard is, of course, carpal-tunnel). But due to the nature of the business world (edits, re-edits, additional input, removed sections) the keyboard is going to be the way to go.Convenience and quality of output are important. Explain what method of output would be best for each of the following situations and explain why:a. Hand held computerWireless data transfer - the whole

Information Systems Paper: Accuracy of data input is important. What method of data input would be best for each of the following situations and explain why:

1404 words - 6 pages magnetic and has a film coated with iron oxide. Specific parts of the tape are magnetized to represent bits of information. Computer Principles, (2006) Using tape drives as a back up is more cost-effective for companies that have large amouts of data to store. Explain the role of each of the following in determining the speed of a computer:RAM - Random access memory is used as a temporary storage space for information. The more RAM a system has

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

The needs of input, output, storage communication devices to computer processing cycle

10650 words - 43 pages storage devices such as disk-hard disk or diskettes or some other kind of disk-that can store data and programs outside of the computer itself. These devices supplement memory or primary storage, which can hold data and program only temporarily. Input: Getting data from the user to the computer Some input data can directly to the computer for processing. Input in this category includes barcodes, speech that enters the computer through a microphone

Computer Programming as a career

572 words - 2 pages the western and northern parts of the U.S. make more money than the ones in the south and eastern areas. This is because there are larger companies in that part of the country; therefore there is a bigger demand for programmers there. To become a computer programmer, a bachelor's degree is usually required. Sometimes a 2 year or associates degree and certificate are also accepted. Classes such as computer science, math, computer information

Using Storytelling In The Classroom As A Form Of Teaching

1001 words - 5 pages Using Storytelling in the Classroom as a Form of TeachingStorytelling and narrative have both been used as a teaching device for hundreds of years. Their roots have surrounded religion, generally as an easier way of understanding the beliefs better. From the early views of Animism and Taoism, later to the views of Judaism and Christianity, and throughout time to today, stories have been used to teach the young and old. However, stories are not

Critically examine the use of social survey as a research method for sociologists

1272 words - 5 pages Social surveys are used in sociological research as a research method, they collect standardised data about large numbers of people. The BCS (British Crime Survey) is a type of social survey involving 14,500 people aged 16 and over. The data that social surveys collect is usually in statistical form and the most practical way of collecting such data is through the use of questionnaires such as the BCS. Stephen Ackroyd and John Hughes

How Can Teaching Writing be Used as a Method of Rehabilitating Young Offenders?

1401 words - 6 pages subject within their writing. Many offenders choose to write about their crimes in order to ‘work through them’ , showing self exploration and a want to ‘share and explore their experiences with others who would understand them and validate their worth as human beings’ , which is allowed through the workshopping method. Validation does not only come from within the ‘classroom’ for inmates however. One of the biggest methods for success in using

Similar Essays

Accuracy Of Data Input, Quality Output, Storage Devices, And Speed Of A Computer

850 words - 3 pages IntroductionThis Paper will discuss the importance of data entry and witch is the best method for data input for a variety of methods. Also this paper will look at convenience and why the quality of output is important. There are different types of storage devices that will be examined, to see which ones are appropriate for a variety of devices. And this paper will give an explanation of the role of hardware in determining the speed of a

Civil Disobedience As A Method Of Protest

884 words - 4 pages By definition, civil disobedience means to actively refuse to obey certain laws, demands, and commands of a government or of an occupying power without resorting to physical violence (Wikipedia 2007). Many of the influential people in history have felt passionately about what they believe. These passions caused them to rebel against a government or authority. Many times they felt so strongly about what they believed and how they

Benefits Of Using Computer Essay

932 words - 4 pages banking is the interest rates which basically range between 5% to 3.40% annually. Unlike the traditional banking, online banking can earn you a better interest or return of investment both in your savings and checking account. (1) The second benefit of using the computer is the easy research that can be done. One of the things that we can do is look for information. As an illustration, when a student is doing homework, almost everyone is looking

Morphology Of The Folk Tales As A Method For Analysis

1888 words - 8 pages women think things should be. Muslim women as martyrs are poorly understood; they are suffering from the loss of significant people such as family members, and they reside in a specific culture with social instability. My essay will examine how narrative analysis can be used in identifying “should be” themes and key points, which could be addressed while studying female suicidal terrorism. Discussion To illuminate this methodology, I chose to