Category: Computer Science
-
The Use of AI in Oil Pipeline Cybersecurity
By Eleanor Haas Abstract: With the conveniences of modern technology comes the increasing risk of cyberattacks, and industrial control systems in infrastructure are particularly vulnerable. While they provide convenience and efficiency, there is also an increasing risk of disruption to these systems, whether by cyberattack, faulty engineering, or natural disasters. This research focuses specifically on…
-
Accessibility in Web Design
Sarah Blevins Abstract: Accessibility is an important aspect of web design. In computer science, we focus on how to write programs, how the workplace is going to be set up, and even computing theories. Some courses discuss accessibility in computer science that leads to learning protocols and procedures in place to ensure that software being developed is…
-
Using Machine Learning to Identify Political Polarization on Social Media
Veronica Cagle Abstract: Polarization in the political sphere, seen through combative communication and stalemate, may impose negative social impacts on the population. Attempting to measure political polarization in the masses through self-reported surveys and interviews can present response biases of social desirability. The classification of thought freely written online allows political polarization to be measured…
-
Computer Science Department Research Symposium
(April 21st, 2023, 12:00 PM – 3:00 PM) James Farmer Hall 210 Veronica Cagle (Department Honors)Presentation Title: “Using Machine Learning to Identify Political Polarization on Social Media” Sarah Blevins (UMW Honors Program)Presentation Title: “Accessibility in Web Design“ Eleanor Haas (UMW Honors Program)Presentation Title: “The Use of AI in Oil Pipeline Cybersecurity“ Sophia StilTitle: “AI in…
-
The Use of AI in Oil Pipeline Cybersecurity
By Eleanor Haas Faculty Mentor: Dr. Xin-Wen Wu Abstract With the conveniences of modern technology comes the increasing risk of cyberattacks, and industrial control systems in infrastructure are particularly vulnerable. While they provide convenience and efficiency, there is also an increasing risk of disruption to these systems, whether by cyberattack, faulty engineering, or natural disasters.…