19 Questions 607 Answers 0 Followers
Questions related from Zeyad Mohammad
The fluctuation in the teaching process from traditional to e-learning and vice versa. Is it a feasible process for teaching?
24 September 2020 8,746 97 View
It is affecting negatively/positively the quality of education
28 July 2020 6,112 92 View
What is the best video conference application (Zoom, Team, Google classroom, ... etc) in terms of security?
03 April 2020 9,110 70 View
What are the secrets to successful university education?
02 February 2020 5,632 90 View
How can we adapt the new technologies to serve traditional education in educational institutions in order to attract students?
27 December 2019 8,538 92 View
the questions ask about your favorite. Do you think these questions may reveal your privacy?
05 October 2019 6,362 89 View
The wars in the future will use drones and robotics for fighting the enemy. Is this possible?
03 October 2019 9,403 67 View
What is your opinion on the internationalization of university study?
13 August 2019 9,099 92 View
Digitalization of all documents in universities. Is it helping to cut time processing documents?
10 August 2019 5,735 84 View
Is it possible to implement ECC bilinear pairing in WSN?
15 July 2019 6,667 28 View
Which master degree program is better the comprehensive track or thesis track?
08 July 2019 6,646 36 View
What is the formal website that is used for testing IoT application vulnerabilities?
08 July 2019 2,229 15 View
What are the research directions in Smart Farm?
01 July 2019 2,524 28 View
Did the traditional war replace with cyber warfare?
01 July 2019 3,745 47 View
What are the research directions in Cyber-security for Mobile Service Robots?
01 July 2019 7,571 24 View
Do you trust the IoT applications in terms of the implemented security?
14 June 2019 2,424 55 View
Is the Mandelbrot and Julia Fractal Set considered a secure against quantum computing?
13 June 2019 5,020 25 View
Is the infrastructure in the world ready to replace traditional car by smart car(self drive car)?
04 June 2019 4,072 35 View
What are the future of traditional authentication protocols that are based on DH or RSA for securing the IoT, Fog and Edge computing in case of emergence of the quantum computing ?
13 May 2019 5,790 27 View