Personal information

Activities

Works (11)

Accurate prediction of chronic diseases using deep learning algorithms

IAES International Journal of Artificial Intelligence (IJ-AI)
2025-02-01 | Journal article
Contributors: Ronald S. Cordova; Rolou Lyn R. Maata; Malik Jawarneh; Marwan I. Alshar'e; Oliver C. Agustin
Source: check_circle
Crossref

Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security

IEEE Access
2023 | Journal article
Contributors: Haitham Y. Adarbah; Mostafa Farhadi Moghadam; Rolou Lyn Rodriguez Maata; Amirhossein Mohajerzadeh; Ali H. Al-Badi
Source: check_circle
Crossref

Performance Analysis of Twofish Cryptography Algorithm in Big Data

Proceedings of the 2020 9th International Conference on Software and Information Engineering (ICSIE)
2020-11-11 | Conference paper
Source: Self-asserted source
Rolou Lyn Maata

Educational Program and Curriculum Evaluation Models: A Mini Systematic Review of the Recent Trends

Universal Journal of Educational Research
2020-09 | Journal article
Part of ISSN: 2332-3205
Part of ISSN: 2332-3213
Source: Self-asserted source
Rolou Lyn Maata

A Framework for Knowledge Sharing in the Research-Teaching Nexus

2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM)
2020-01 | Conference paper
Source: Self-asserted source
Rolou Lyn Maata

Blowfish Algorithm Implementation on Electronic Data in a Communication Network

2019 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2019
2019 | Conference paper
EID:

2-s2.0-85078940210

Contributors: Cordova, R.S.; Maata, R.L.R.; Halibas, A.S.
Source: Self-asserted source
Rolou Lyn Maata via Scopus - Elsevier

A proposed concept and model to strengthen the implementation of technopreneurship in higher education institutions

Proceedings of Majan International Conference: Promoting Entrepreneurship and Technological Skills: National Needs, Global Trends, MIC 2018
2018 | Conference paper
EID:

2-s2.0-85048436138

Contributors: Maata, R.L.R.; Azawi, R.A.; Masmoudi, I.; Shaqsi, A.S.A.
Source: Self-asserted source
Rolou Lyn Maata via Scopus - Elsevier

Analysis of Authentication on Online Purchase Using Honey Password

2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017
2018 | Conference paper
EID:

2-s2.0-85057954112

Contributors: Sudramurthy, B.; Obaidy, M.A.; Maata, R.L.
Source: Self-asserted source
Rolou Lyn Maata via Scopus - Elsevier

Design and Implementation of Client-Server Based Application Using Socket Programming in a Distributed Computing Environment

2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017
2018 | Conference paper
EID:

2-s2.0-85057957296

Contributors: Maata, R.L.; Cordova, R.; Sudramurthy, B.; Halibas, A.
Source: Self-asserted source
Rolou Lyn Maata via Scopus - Elsevier

Comparative analysis on the performance of selected security algorithms in cloud computing

2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017
2017 | Conference paper
EID:

2-s2.0-85045993149

Contributors: Cordova, R.S.; Maata, R.L.R.; Halibas, A.S.; Al-Azawi, R.
Source: Self-asserted source
Rolou Lyn Maata via Scopus - Elsevier

The penta helix model of innovation in Oman: An hei perspective

Interdisciplinary Journal of Information, Knowledge, and Management
2017 | Journal article
EID:

2-s2.0-85021297663

Contributors: Halibas, A.S.; Sibayan, R.O.; Maata, R.L.R.
Source: Self-asserted source
Rolou Lyn Maata via Scopus - Elsevier