Roba Mahmoud Ali Aloglah

ORCID: 0000-0003-1807-8618
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • EFL/ESL Teaching and Learning
  • Smart Cities and Technologies
  • Algorithms and Data Compression
  • Peer-to-Peer Network Technologies
  • Energy Efficient Wireless Sensor Networks
  • Second Language Learning and Teaching
  • Chaos-based Image/Signal Encryption
  • Data Mining Algorithms and Applications
  • Advanced Database Systems and Queries
  • Education and Critical Thinking Development

Al-Balqa Applied University
2021

<span lang="EN-US">There has been an increased demand for structured data mining. Graphs are among the most extensively researched structures in discrete mathematics and computer science. Thus, it should come as no surprise that graph-based mining gained popularity recent years. Graph-based methods a transaction database necessary to transform all information into graph form conveniently extract more valuable improve decision-making process. can reveal measure process insights detailed...

10.11591/ijai.v14.i2.pp1663-1672 article EN IAES International Journal of Artificial Intelligence 2025-02-17

With the advent of number smart devices across globe, increasing users using Internet. The main aim fog computing (FC) paradigm is to connect huge objects (billions object) that can make a bright future for cities. Due large deployments devices, are expected generate amounts data and forward through FC also refers an edge framework mitigates issue by applying process knowledge discovery analysis approach edges. Thus, approaches work together with internet things (IoT) world, which build...

10.11591/ijece.v11i3.pp2219-2228 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2021-02-06

The Vernam-cipher is known as a one-time pad of algorithm that an unbreakable because it uses typically random key equal to the length data be coded, and component text encrypted with element encryption key. In this paper, we propose novel technique overcome obstacles hinder use Vernam algorithm. First, advance standard AES algorithms are used encrypt well hide key; Second, password placed on file algorithm; thus, protection record becomes very high. Huffman then for compression reduce size...

10.11591/ijece.v11i3.pp2335-2342 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2021-02-06

This study aimed to examine the association between beliefs about language learning and proficiency among Jordanian EFL learners at Ajloun University College. The data were gathered by two modified versions of collection tools; a questionnaire examining (developed Horwitz (2001)) (2) test Shoeib (2004)). tools applied randomly recruit 100 (Fifty male Fifty female) participants from English department Statistical Package Social Sciences (SPSS) was used process responses. Pearson Correlation...

10.17507/jltr.1201.16 article EN Journal of Language Teaching and Research 2021-01-01
Coming Soon ...