Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin
Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin
Master of Science in Computer Science Theses
This paper attempts to answer the question of if it’s possible to produce a simple, quick, and accurate neural network for the use in upper-limb prosthetics. Through the implementation of convolutional and artificial neural networks and feature extraction on electromyographic data different possible architectures are examined with regards to processing time, complexity, and accuracy. It is found that the most accurate architecture is a multi-entry categorical cross entropy convolutional neural network with 100% accuracy. The issue is that it is also the slowest method requiring 9 minutes to run. The next best method found was a single-entry binary cross entropy …
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.
These replay attacks can be accomplished by capturing recorded …
Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne
Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne
Journal of Cybersecurity Education, Research and Practice
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.
However, up to this point there has been a …
Spring 2019, Joëlle Walls
Spring 2019, Joëlle Walls
The Investigator Research Magazine
We are excited to launch The Investigator, a new magazine which will be produced annually by the Office of Research at Kennesaw State University. You will find stories that span the spectrum and which impact the community through the research, service and creative activities conducted by KSU faculty, staff and students.
One feature describes how Jonathan McMurry and John Salerno partnered to create KSU’s first incubator company, New Echota Biotechnology. Another feature details the first year success of KSU Upward Bound programs, implemented in Polk and Paulding county high schools which help prepare students for college.
You will read how …