19 Questions 607 Answers 0 Followers
Questions related from Zeyad Mohammad
The fluctuation in the teaching process from traditional to e-learning and vice versa. Is it a feasible process for teaching?
24 September 2020 8,732 97 View
It is affecting negatively/positively the quality of education
28 July 2020 6,095 92 View
What is the best video conference application (Zoom, Team, Google classroom, ... etc) in terms of security?
03 April 2020 9,090 70 View
What are the secrets to successful university education?
02 February 2020 5,593 90 View
How can we adapt the new technologies to serve traditional education in educational institutions in order to attract students?
27 December 2019 8,530 92 View
the questions ask about your favorite. Do you think these questions may reveal your privacy?
05 October 2019 6,342 89 View
The wars in the future will use drones and robotics for fighting the enemy. Is this possible?
03 October 2019 9,390 67 View
What is your opinion on the internationalization of university study?
13 August 2019 9,077 92 View
Digitalization of all documents in universities. Is it helping to cut time processing documents?
10 August 2019 5,726 84 View
Is it possible to implement ECC bilinear pairing in WSN?
15 July 2019 6,656 28 View
Which master degree program is better the comprehensive track or thesis track?
08 July 2019 6,624 36 View
What is the formal website that is used for testing IoT application vulnerabilities?
08 July 2019 2,210 15 View
What are the research directions in Smart Farm?
01 July 2019 2,510 28 View
Did the traditional war replace with cyber warfare?
01 July 2019 3,734 47 View
What are the research directions in Cyber-security for Mobile Service Robots?
01 July 2019 7,565 24 View
Do you trust the IoT applications in terms of the implemented security?
14 June 2019 2,395 55 View
Is the Mandelbrot and Julia Fractal Set considered a secure against quantum computing?
13 June 2019 5,011 25 View
Is the infrastructure in the world ready to replace traditional car by smart car(self drive car)?
04 June 2019 4,048 35 View
What are the future of traditional authentication protocols that are based on DH or RSA for securing the IoT, Fog and Edge computing in case of emergence of the quantum computing ?
13 May 2019 5,767 27 View