{"id":1003,"date":"2018-05-11T14:51:31","date_gmt":"2018-05-11T18:51:31","guid":{"rendered":"https:\/\/www.monmouth.edu\/department-of-csse\/research-topics-monmouth-university\/"},"modified":"2025-10-07T17:08:49","modified_gmt":"2025-10-07T21:08:49","slug":"research-topics","status":"publish","type":"page","link":"https:\/\/www.monmouth.edu\/department-of-csse\/research-topics\/","title":{"rendered":"Research Topics"},"content":{"rendered":"\n<p>Research in the Monmouth University Computer Science and Software Engineering Department falls into the following areas:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"artificial-intelligence\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1899\" style=\"object-position: 46.18% 31.003333333333%\" src=\"https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-300x169.jpg\" alt=\"\" width=\"400\" height=\"225\" srcset=\"https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-300x169.jpg 300w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-768x432.jpg 768w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-1024x576.jpg 1024w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-560x315.jpg 560w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-280x158.jpg 280w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-320x180.jpg 320w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-640x360.jpg 640w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty-360x203.jpg 360w, https:\/\/www.monmouth.edu\/department-of-csse\/wp-content\/uploads\/sites\/395\/2018\/05\/studentsfaculty.jpg 1100w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>Artificial Intelligence<\/h2>\n\n\n<p>AI can be described as the study of systems that process data that are usually non-numeric, such as text and images, in such a way that we can extract patterns and information (meanings) from them. We use techniques in natural language processing, information retrieval, information extraction, machine translation, machine learning, data mining, cognitive science, and the semantic web, to name a few.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/ling-zheng\/\">Ling Zheng, Ph. D.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/richard-scherl\/\">Richard Scherl, Ph.D.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/wqu\/\">Weihao Qu, Ph. D.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/bcallaha\/\">Brian Callahan, Ph. D.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/adas\/\">Arup Das<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"biomedical-informatics\">Biomedical Informatics<\/h2>\n\n\n<p>According to the American Medical Informatics Association, biomedical informatics is an emerging and interdisciplinary field that studies the effective uses of biomedical data, information, and knowledge to improve human health. Research in the department is focused on biomedical ontologies, which are controlled vocabularies of well-defined terms connected by relationships. Biomedical ontologies are developed to express data in ways that computers can understand the meanings, in order to facilitate biomedical data sharing and knowledge discovery, thus improving healthcare and biomedical research.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/ling-zheng\/\">Ling Zheng, Ph. D.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/wqu\/\">Weihao Qu, Ph. D.<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"cybersecurity\">Cybersecurity<\/h2>\n\n\n<p>Cybersecurity encompasses the measures and practices implemented to protect systems, networks, data, and individuals from unauthorized access, misuse, and potential threats. It involves a combination of technological safeguards, such as encryption, firewalls, and intrusion detection systems, alongside procedural strategies like access controls, user authentication, and regular audits. Effective security ensures the confidentiality, integrity, and availability of critical information, defending against cyber-attacks, data breaches, and other malicious activities. Penetration testing will be used to detect potential vulnerabilities of systems. Additionally, program analysis can also protect the security.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/wqu\/\">Weihao Qu, Ph. D.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/bcallaha\/\">Brian Callahan, Ph. D.<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"data-analytics\">Data Analytics<\/h2>\n\n\n<p>Nowadays, huge amounts of digital data are generated in many domains (social networks, urban environments, scientific fields, business domains) and their volumes are growing faster than ever before. According to several studies, by the year 2020 about 1.7 MegaBytes of new information will be created every second for every human being on the planet. Such huge volume of data (i.e., Big Data) can be analyzed and exploited by data analytics algorithms to discover hidden and valuable information (i.e., predictive and descriptive models, patterns, regularities) concerning human dynamics and behaviors, and leading to useful applications in both business and scientific fields.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/adas\/\">Arup Das<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"databases\">Databases<\/h2>\n\n\n<p>In computer science, the theories and methods that relate to the storage and retrieval of large collections of data continues to be a fertile area of research. Database research in the department is focused in the areas of <em>database management <\/em>and <em>information retrieval.<\/em><\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/ling-zheng\/\">Ling Zheng, Ph. D.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/cui-yu\/\">Cui Yu, Ph. D.<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"emergency-management\">Emergency Management<\/h2>\n\n\n<p>Emergency management is a process by which all individuals, groups, and communities manage hazards in an effort to avoid or ameliorate the impact of disasters resulting from the hazards. It involves four phases: mitigation, preparedness, response, and recovery. Mitigation efforts attempt to prevent hazards from developing into disasters altogether, or to reduce the effects of disasters when they occur. In the preparedness phase, emergency managers develop plans of action for when the disaster strikes, and analyze and manage required resources. The response phase executes the action plans, which includes the mobilization of the necessary emergency services and dispatch of first responders and other material resources in the disaster area. The aim of the recovery phase is to restore the affected area to its previous state. Effective emergency management relies on thorough integration of emergency plans at all levels of government and non-government involvement.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/jiacun-wang\/\">Jiacun Wang, Ph. D.<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"formal-methods\">Formal Methods<\/h2>\n\n\n<p>A formal method is a mathematic method that uses formal language in the specification, design, construction, and verification of computer systems and software. Formal languages include logic, Petri nets, finite state machines, statecharts, and so on. The development of a formal specification provides insights and an understanding of the software requirements and software design. Since software specifications are mathematical entities and may be analyzed using mathematical methods.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/jiacun-wang\/\">Jiacun Wang, Ph. D.<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"networks\">Networks<\/h2>\n\n\n<p>The area of computer science that focuses on the study of multiple computer systems that are connected together using a telecommunication system for data and resource sharing and communication. Networks research in the department is focused in the areas of <em>wireless communications<\/em>, <em>telecommunications<\/em>, <em>network security<\/em>, and <em>network algorithms<\/em>.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/jiacun-wang\/\">Jiacun Wang, Ph. D.<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"quantum-computing\">Quantum Computing<\/h2>\n\n\n<p>Quantum computing is an emerging technology that uses the\u00a0principles of quantum mechanics to help solve problems that our current computers are unable to solve. It uses qubits, the basic quantum unit of information that can be 0, 1, or a superposition of both, to be able to generates solutions to complex problems faster than current computers will ever be able to achieve. Quantum computing is poised to revolutionize a huge variety of fields including cybersecurity, medicine, artificial intelligence (AI) and machine learning (ML), and finance. Quantum practitioners stand at the forefront of what is possible for knowledge development. At Monmouth, all students beginning freshman year can do real-world hands-on research with this exciting new technology that has global excitement.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/bcallaha\/\">Brian Callahan, Ph.D.<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"workflow-management\">Workflow Management<\/h2>\n\n\n<p>Workflow management deals with the automation of business processes through software. A workflow management system coordinates process instances according to a formal model of the process, and matches individual activities with properly qualified resources for execution. The business environment today is undergoing rapid and constant changes. The way companies do business, including the business processes and their underlying business rules, should adapt to these changes flexibly with minimum interruption to ongoing operations.<\/p>\n\n\n\n<p>Associated faculty:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.monmouth.edu\/directory\/profiles\/jiacun-wang\/\">Jiacun Wang, Ph. D.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Research Topics<br \/>\n Research in the Monmouth University Computer Science and Software Engineering Department falls into the following areas:<br \/>\n Artificial Intelligence<br \/>\n AI can be described as the study of systems that process data that are usually non-numeric, such as text and images, in such a way that we can extract patterns and information (meanings) from them. We use techniques in natural language processing, information retrieval, information extraction, machine translation, machine learning, data mining, cognitive science, and the semantic web, to name a few.<br \/>\n Associated faculty:<\/p>\n<p> Michiko Kosaka<br \/>\n Richard Scherl<br \/>\n Mohammad S. Obaidat<\/p>\n<p> Cybersecurity<br \/>\n This area focuses on the security and assurance of computer, information and computer network systems. Current efforts include security of wireless networks, security of wireless sensor networks, security of e-systems and computer networks, security of computer systems and biometric-based security systems. New security protocols, schemes and methods have been devised and developed in these areas.<br \/>\n Associated faculty:<\/p>\n<p> Mohammad S. Obaidat<\/p>\n<p> Databases<br \/>\n In computer science, the theories and methods that relate to the storage and retrieval of large collections of data continues to be a fertile area of research. Database research in the department is focused in the areas of database management and information retrieval.<br \/>\n Associated faculty:<\/p>\n<p> Cui Yu<\/p>\n<p> Emergency Management<br \/>\n Emergency management is a process by which all individuals, groups, and communities manage hazards in an effort to avoid or ameliorate the impact of disasters resulting from the hazards. It involves four phases: mitigation, preparedness, response, and recovery. Mitigation efforts attempt to prevent hazards from developing into disasters altogether, or to reduce the effects of disasters when they occur. In the preparedness phase, emergency managers develop plans of action for when the disaster strikes, and analyze and manage required resources. The response phase executes the action plans, which includes the mobilization of the necessary emergency services and dispatch of first responders and other material resources in the disaster area. The aim of the recovery phase is to restore the affected area to its previous state. Effective emergency management relies on thorough integration of emergency plans at all levels of government and non-government involvement.<br \/>\n Associated faculty:<\/p>\n<p> Jiacun Wang<br \/>\n Allan Milewski<br \/>\n Daniela Rosca<br \/>\n Bill Tepfenhart<\/p>\n<p> Formal Methods<br \/>\n A formal method is a mathematic method that uses formal language in the specification, design, construction, and verification of computer systems and software. Formal languages include logic, Petri nets, finite state machines, statecharts, and so on. The development of a formal specification provides insights and an understanding of the software requirements and software design. Since software specifications are mathematical entities and may be analyzed using mathematical methods.<br \/>\n Associated faculty:<\/p>\n<p> Jiacun Wang<br \/>\n Bill Tepfenhart<\/p>\n<p> Global Collaboration of Software Teams<br \/>\n Collaboration involves several people working together by sharing knowledge, building consensus, and jointly producing products. Recently, the structure of the software industry has required collaboration among software teams that are distributed geographically, temporally, and culturally. This area of research seeks to understand productive and unproductive aspects of this interaction so as to develop improved tools and methods.<br \/>\n Associated faculty:<\/p>\n<p> Allan Milewski<\/p>\n<p> Learning Automata and Adaptive Learning<br \/>\n This area focuses on devising new learning automata, and neural networks algorithms for optimization, compression and recognition, among others. New protocols have been devised to optimize routing in wired and wireless computer networks based on new learning automata and adaptive learning paradigms developed by our group. We also devised other new algorithms based on neural networks, genetic algorithms and ant colony techniques.<br \/>\n Associated faculty:<\/p>\n<p> Mohammad S. Obaidat \u00a0<\/p>\n<p> Modeling and Computer Simulation<br \/>\n This area concentrates on using analytic mathematical modeling and analysis techniques as well as simulation analysis to study and analyze all kinds of systems that range from toll plaza systems to wide area communication networks. Queuing analysis and probabilistic models are developed to either model systems under study or to validate simulation models.<br \/>\n Associated faculty:<\/p>\n<p> Mohammad S. Obaidat<\/p>\n<p> Networks<br \/>\n The area of computer science that focuses on the study of multiple computer systems that are connected together using a telecommunication system for data and resource sharing and communication. Networks research in the department is focused in the areas of wireless communications, telecommunications, network security, and network algorithms.<br \/>\n Associated faculty:<\/p>\n<p> Mohammad S. Obaidat<br \/>\n Jiacun Wang<\/p>\n<p> Performance Evaluation of Computer and Telecommunication Systems<br \/>\n This area of research focuses on devising new techniques to evaluate the performance of computer and network systems including measurement, analytic, and simulation techniques. We also apply methodologies to simulate wireless networks, and computer and telecommunication systems by developing new simulators or new analytic models.<br \/>\n Associated faculty:<\/p>\n<p> Mohammad S. Obaidat<\/p>\n<p> Software Project Management<br \/>\n The most common cause for failures of software development projects is poor management. Research in software project management aims to characterize how project teams operate, identify the most important causes of failures, develop methods and guidelines for estimating schedules and costs, and improve methods for teaching students how to do this work effectively in industrial environments.<br \/>\n Associated faculty:<\/p>\n<p> James McDonald<\/p>\n<p> Usability Engineering<br \/>\n Usability engineering is concerned with human-computer interaction and with making human-computer interfaces that are highly useful and useable, and that allows users to accomplish the tasks effectively and efficiently. This area of research explores methods for designing and evaluating sound user interfaces by focusing on user needs and capabilities.<br \/>\n Associated faculty:<\/p>\n<p> Allan Milewski<br \/>\n Bill Tepfenhart<\/p>\n<p> Wireless Sensor Networks<br \/>\n This area concentrates on devising new schemes for routing in Wireless Sensor Networks (WSNs) as well as using WSNs for various applications including fire detection, underwater sensing, real-time systems, and military applications. We also developed new security schemes to address security issues and holes in WSNs. We developed recently a new efficient and secure routing protocol for WSNs using multicasting. We also devised a Learning Automata-based scheme for intrusion detection in WSNs.<br \/>\n Associated faculty:<\/p>\n<p> Mohammad S. Obaidat<\/p>\n<p> Workflow Management<br \/>\n Workflow management deals with the automation of business processes through software. A workflow management system coordinates process instances according to a formal model of the process, and matches individual activities with properly qualified resources for execution. The business environment today is undergoing rapid and constant changes. The way companies do business, including the business processes and their underlying business rules, should adapt to these changes flexibly with minimum interruption to ongoing operations.<br \/>\n Associated faculty:<\/p>\n<p> Jiacun Wang<br \/>\n Daniela Rosca<br \/>\n Bill Tepfenhart<\/p>\n<p> \u00a0<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mu_eop_enabled":false,"_mu_eop_name":"","_mu_eop_name_override":false,"_mu_eop_description":"","_mu_eop_description_override":false,"_mu_eop_url":"","_mu_eop_url_override":false,"_mu_eop_program_type":"","_mu_eop_educational_credential":"","_mu_eop_time_to_complete":"","_mu_eop_number_of_credits":"","_mu_eop_occupational_category":"","_mu_eop_occupational_category_code":"","_mu_eop_program_prerequisites":"","_mu_eop_application_deadline":"","_mu_eop_application_start_date":"","_mu_eop_start_date":"","_mu_eop_end_date":"","_mu_eop_day_of_week":"","_mu_eop_time_of_day":"","_mu_eop_educational_program_mode":"","_mu_eop_financial_aid_eligible":"","_mu_eop_maximum_enrollment":"","_mu_eop_offers_price":"","_mu_eop_offers_currency":"USD","_mu_eop_offers_price_per":"","_mu_eop_offers_preset":"","_mu_eop_salary_upon_completion":"","_mu_eop_training_salary":"","_mu_eop_recognized_by_name":"","_mu_eop_recognized_by_url":"","_mu_eop_concentrations":"","_mu_eop_identifier_cip":"","_mu_eop_provider_name":"","_mu_eop_provider_name_override":false,"_mu_eop_provider_url":"","_mu_eop_provider_address":"","_mu_eop_provider_city":"","_mu_eop_provider_state":"","_mu_eop_provider_zip":"","_mu_eop_provider_country":"","footnotes":""},"class_list":["post-1003","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/pages\/1003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/comments?post=1003"}],"version-history":[{"count":33,"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/pages\/1003\/revisions"}],"predecessor-version":[{"id":5486,"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/pages\/1003\/revisions\/5486"}],"wp:attachment":[{"href":"https:\/\/www.monmouth.edu\/department-of-csse\/wp-json\/wp\/v2\/media?parent=1003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}