Browsing by Subject "software"
Now showing 1 - 12 of 12
- Results Per Page
- Sort Options
Item Embedding Ethical Theory Into Autonomous Vehicles: Analyzing a Covergence of Ethics and Action Embedding Ethical Theory Into Autonomous Vehicles: Analyzing a Convergence of Ethics and Action(2020-05) Atchley, AustinThe ability of autonomous vehicle systems to collect data and, independently of passion, make split-second decisions creates a newly emerging phenomenon: developers encode their ethical views into something that will (almost deterministically) enact them in reality. This is a departure from the traditional relationship between belief and action that is present in each decision made by a human, and, as artificial intelligence becomes more widespread, perhaps a majority of day-to-day decisions will be made without human unpredictability. Instead, decision-making will boil down to the application of ethical principles (either explicitly or implicitly) to a dataset. In creating ethical autonomous vehicles, we should address the problem using both top-down and bottom-up approaches to encoding ethical beliefs. The top-down approach uses high-level ethical values defined by the software creator to drive decision-making processes, and the bottom-up approach attempts to mimic human ethical conduct by using a pre-collected dataset of decisions made by real human drivers. Currently, many developers are not aware of the ethical principles they embed into their code, and by taking an explicit approach to ethical decision-making, we can encourage morally preferable decisions to be taken by autonomous vehicles. These issues are inherently interdisciplinary, and this thesis treats them as such, borrowing from both engineering and philosophical discourse. I argue that a similarly holistic perspective should be adopted by scholars working on the many-faceted topic of autonomous driving.Item G-WING: A NOVEL SOFTWARE TOOL FOR TOOLPATH-CENTRIC DESIGN OF WINGS FOR MATERIAL EXTRUSION(University of Texas at Austin, 2023) Valenti, Justin D.; Bartolai, Joseph; Yukish, Michael A.A novel software tool for the design of small aircraft wings to be fabricated with material extrusion is presented where the key requirement of the tool is to minimize the time from identified need to realized capability. The tool, named G-Wing, uses rapid design algorithms based on lifting line theory to determine the outer-mold line of the wing based on desired aerodynamic behavior. The resulting wing shape and flight-load distribution are given to a structural design algorithm to determine the internal structure of the wing based on both expected flight loads and manufacturing constraints. Finally, manufacturing instructions in the form of G-Code are created directly from the wing shape and internal structure. This process removes explicit geometric modeling and slicing from the critical design path and directly converts airfoil coordinates to perimeter G-Code points, minimizing the introduction of geometric error. This process has been used to design and fabricate multiple small aircraft wings that have successfully flown. G-Code for an example wing section is shown to be lighter and require less build time compared to G-Code generated by a standard CAD-slicing toolchain.Item Linear_Algebra_Disk1(1996) Lenchner, GeorgeItem Linear_Algebra_Disk2(1996) Lenchner, GeorgeItem Maganom: A computer program for the modeling and interpretation of marine magnetic anomalies(Institute for Geophysics, 1987) Ross, Malcolm I.Item OBSTOOL: Software for Processing UTIG OBS Data(Institute for Geophysics, 1995) Christeson, GailItem Paleoceanographic Mapping Project (POMP): Research Goals, Methods, and Future Plans (Paleoceanographic Mapping Project Report No. 02-1184)(Institute for Geophysics, 1984) Scotese, Christopher R.; Lawver, Lawrence A.; Sclater, John G.; Sawyer, DaleItem Robust Software Vulnerability Detection Using Bayesian Gated Recurrent Unit(2022-09-29) Aminul, Orune; Dera, DimahSoftware systems are prone to source code vulnerabilities, resulting in deadlock, hacking, information leakage, and system failure. It is crucial to spot the security holes and identify the vulnerable software components prior to such encounters to prevent any security breach or system crash. While conventional machine learning and neural network-based vulnerability detection techniques have been reported in the literature, it is still challenging to determine the trustworthiness of these models. In this study, we develop a robust approach for detecting software vulnerabilities using a Bayesian gated recurrent unit. The proposed model identifies source code vulnerability while simultaneously learning the output prediction uncertainty. In the Bayesian framework, the Gaussian distribution is introduced as a prior distribution over the network parameters, which are then propagated through the network layers and activation functions. At the network output, the mean of the predictive distribution indicates the predicted vulnerability in source codes, while the covariance matrix reflects the uncertainty in predicted vulnerability. To evaluate the robustness of the model, we conducted rigorous experiments with 1.27 million source codes in C/C++. We reported the performance for five types of Common vulnerabilities encountered under different levels of Gaussian noise and adversarial attacks and compared the results with the state-of-the-art methods. The training and testing were done on the HPC resources in The Texas Advanced Computing Center (TACC), particularly on the lonestar6 supercomputer. This work is under the TACC project "TRUST- TRustworthy Uncertainty Propagation for Sequential Time-Series Analysis". By submitting multiple jobs to the queue, we could complete significant simulations within a reasonable period. The investigations have confirmed that the proposed model produces a significantly higher uncertainty when encountered with high levels of natural noise or adversarial attacks and could be used as a measure to alert human users in many high-stake applications.Item RSTTI Package: Ray Based Seismic Travel Time Inversion(Institute for Geophysics, 1996) Operto, StephaneItem Structure of the iSH2 domain of human phosphatidylinositol 3-kinase p85b subunit reveals conformational plasticity in the interhelical turn region(2010-12) Schauder, Curtis; Ma, Li-Chung; Krug, Robert M.; Montelione, Gaetano T.; Guan, Rongjin; Krug, Robert M.Phosphatidylinositol 3-kinase (PI3K) proteins actively trigger signaling pathways leading to cell growth, proliferation and survival. These proteins have multiple isoforms and consist of a catalytic p110 subunit and a regulatory p85 subunit. The iSH2 domain of the p85 beta isoform has been implicated in the binding of nonstructural protein 1 (NS1) of influenza A viruses. Here, the crystal structure of human p85 beta iSH2 determined to 3.3 A resolution is reported. The structure reveals that this domain mainly consists of a coiled-coil motif. Comparison with the published structure of the bovine p85 beta iSH2 domain bound to the influenza A virus nonstructural protein 1 indicates that little or no structural change occurs upon complex formation. By comparing this human p85 beta iSH2 structure with the bovine p85 beta iSH2 domain, which shares 99% sequence identity, and by comparing the multiple conformations observed within the asymmetric unit of the bovine iSH2 structure, it was found that this coiled-coil domain exhibits a certain degree of conformational variability or `plasticity' in the interhelical turn region. It is speculated that this plasticity of p85 beta iSH2 may play a role in regulating its functional and molecular-recognition properties.Item Unified Software for Multi-Functional G-Code: A Method for Implementing Multi-Technology Additive Manufacturing(University of Texas at Austin, 2016) Aguilera, E.; Bailey, C.; Espalin, D.; MacDonald, E.; Wicker, R.Additive manufacturing (AM) began a manufacturing revolution moving industrial production into consumer homes. With interest shifting toward multi-functional parts fabricated through AM technologies, multi-functional fabrication systems are now being developed. Merging different manufacturing technologies into a single machine is a challenge, but ongoing research in the development of multi-technology systems has shown promise. The software and automation aspects of multi-technology systems are being developed in unison. This paper explores the challenges and approaches to developing software that interfaces with multifunctional CADs and creates files for direct use in multi-technology AM machines.Item Work Teams With More Freedom Perform Better(2022-01-19) Parker, Sally