Help Tetraplegic People by Means of a Computational Neuronal Control System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 1
Abstract
In the present document we present an Interface called BrainMouse where its main task is to help people with motor disabilities specially tetraplegic or quadriplegic people that they can move the mouse of the computer by means of blinking or any neural response. The Interface uses the data obtained from a neuronal system which is responsible for taking reliable readings of the electrical signals generated in the human brain, through non-intrusive neuronal interfaces. The recorded data is used by the BrainMouse Interface so that the mouse can perform functions such as an up, down, left lateral, right lateral, left click, right click and double click. Thus, this interface has all the options that a conventional mouse would have.
Authors and Affiliations
Jaime Moreno, Oswaldo Morales, Ricardo Tejeida, America Gonzalez, Dario Rodriguez
A Novel Edge Cover based Graph Coloring Algorithm
Graph Colouring Problem is a well-known NP-Hard problem. In Graph Colouring Problem (GCP) all vertices of any graph must be coloured in such a way that no two adjacent vertices are coloured with the same colour. In this...
New electronic white cane for stair case detection and recognition using ultrasonic sensor
Blinds people need some aid to interact with their environment with more security. A new device is then proposed to enable them to see the world with their ears. Considering not only system requirements but also technolo...
Enhancing Quality of Lossy Compressed Images using Minimum Decreasing Technique
The acceleration in technology development came with the urgent need to use large amounts of information, and the way of storing or transferring the huge information via various digital networks became very important iss...
A Review on the Verification Approaches and Tools used to Verify the Correctness of Security Algorithms and Protocols
Security algorithms and protocols are typical essential upgrades that must be involved within systems and their structures to provide the best performance. The protocols and systems should go through verification and tes...
Three Layer Hierarchical Model for Chord
Increasing popularity of decentralized Peer-to-Peer (P2P) architecture emphasizes on the need to come across an overlay structure that can provide efficient content discovery mechanism, accommodate high churn rate and ad...