Research in the Monmouth University Computer Science and Software Engineering Department falls into the following areas:
AI can be described as the study of systems that process data that are usually non-numeric, such as text and images, in such a way that we can extract patterns and information (meanings) from them. We use techniques in natural language processing, information retrieval, information extraction, machine translation, machine learning, data mining, cognitive science, and the semantic web, to name a few.
This area focuses on the security and assurance of computer, information and computer network systems. Current efforts include security of wireless networks, security of wireless sensor networks, security of e-systems and computer networks, security of computer systems and biometric-based security systems. New security protocols, schemes and methods have been devised and developed in these areas.
In computer science, the theories and methods that relate to the storage and retrieval of large collections of data continues to be a fertile area of research. Database research in the department is focused in the areas of database management and information retrieval.
Emergency management is a process by which all individuals, groups, and communities manage hazards in an effort to avoid or ameliorate the impact of disasters resulting from the hazards. It involves four phases: mitigation, preparedness, response, and recovery. Mitigation efforts attempt to prevent hazards from developing into disasters altogether, or to reduce the effects of disasters when they occur. In the preparedness phase, emergency managers develop plans of action for when the disaster strikes, and analyze and manage required resources. The response phase executes the action plans, which includes the mobilization of the necessary emergency services and dispatch of first responders and other material resources in the disaster area. The aim of the recovery phase is to restore the affected area to its previous state. Effective emergency management relies on thorough integration of emergency plans at all levels of government and non-government involvement.
A formal method is a mathematic method that uses formal language in the specification, design, construction, and verification of computer systems and software. Formal languages include logic, Petri nets, finite state machines, statecharts, and so on. The development of a formal specification provides insights and an understanding of the software requirements and software design. Since software specifications are mathematical entities and may be analyzed using mathematical methods.
Collaboration involves several people working together by sharing knowledge, building consensus, and jointly producing products. Recently, the structure of the software industry has required collaboration among software teams that are distributed geographically, temporally, and culturally. This area of research seeks to understand productive and unproductive aspects of this interaction so as to develop improved tools and methods.
This area focuses on devising new learning automata, and neural networks algorithms for optimization, compression and recognition, among others. New protocols have been devised to optimize routing in wired and wireless computer networks based on new learning automata and adaptive learning paradigms developed by our group. We also devised other new algorithms based on neural networks, genetic algorithms and ant colony techniques.
This area concentrates on using analytic mathematical modeling and analysis techniques as well as simulation analysis to study and analyze all kinds of systems that range from toll plaza systems to wide area communication networks. Queuing analysis and probabilistic models are developed to either model systems under study or to validate simulation models.
The area of computer science that focuses on the study of multiple computer systems that are connected together using a telecommunication system for data and resource sharing and communication. Networks research in the department is focused in the areas of wireless communications, telecommunications, network security, and network algorithms.
This area of research focuses on devising new techniques to evaluate the performance of computer and network systems including measurement, analytic, and simulation techniques. We also apply methodologies to simulate wireless networks, and computer and telecommunication systems by developing new simulators or new analytic models.
The most common cause for failures of software development projects is poor management. Research in software project management aims to characterize how project teams operate, identify the most important causes of failures, develop methods and guidelines for estimating schedules and costs, and improve methods for teaching students how to do this work effectively in industrial environments.
Usability engineering is concerned with human-computer interaction and with making human-computer interfaces that are highly useful and useable, and that allows users to accomplish the tasks effectively and efficiently. This area of research explores methods for designing and evaluating sound user interfaces by focusing on user needs and capabilities.
This area concentrates on devising new schemes for routing in Wireless Sensor Networks (WSNs) as well as using WSNs for various applications including fire detection, underwater sensing, real-time systems, and military applications. We also developed new security schemes to address security issues and holes in WSNs. We developed recently a new efficient and secure routing protocol for WSNs using multicasting. We also devised a Learning Automata-based scheme for intrusion detection in WSNs.
Workflow management deals with the automation of business processes through software. A workflow management system coordinates process instances according to a formal model of the process, and matches individual activities with properly qualified resources for execution. The business environment today is undergoing rapid and constant changes. The way companies do business, including the business processes and their underlying business rules, should adapt to these changes flexibly with minimum interruption to ongoing operations.