19 Questions 607 Answers 0 Followers
Questions related from Zeyad Mohammad
The fluctuation in the teaching process from traditional to e-learning and vice versa. Is it a feasible process for teaching?
24 September 2020 8,776 97 View
It is affecting negatively/positively the quality of education
28 July 2020 6,135 92 View
What is the best video conference application (Zoom, Team, Google classroom, ... etc) in terms of security?
03 April 2020 9,147 70 View
What are the secrets to successful university education?
02 February 2020 5,666 90 View
How can we adapt the new technologies to serve traditional education in educational institutions in order to attract students?
27 December 2019 8,557 92 View
the questions ask about your favorite. Do you think these questions may reveal your privacy?
05 October 2019 6,385 89 View
The wars in the future will use drones and robotics for fighting the enemy. Is this possible?
03 October 2019 9,423 67 View
What is your opinion on the internationalization of university study?
13 August 2019 9,131 92 View
Digitalization of all documents in universities. Is it helping to cut time processing documents?
10 August 2019 5,755 84 View
Is it possible to implement ECC bilinear pairing in WSN?
15 July 2019 6,705 28 View
Which master degree program is better the comprehensive track or thesis track?
08 July 2019 6,679 36 View
What is the formal website that is used for testing IoT application vulnerabilities?
08 July 2019 2,262 15 View
What are the research directions in Smart Farm?
01 July 2019 2,552 28 View
Did the traditional war replace with cyber warfare?
01 July 2019 3,772 47 View
What are the research directions in Cyber-security for Mobile Service Robots?
01 July 2019 7,594 24 View
Do you trust the IoT applications in terms of the implemented security?
14 June 2019 2,457 55 View
Is the Mandelbrot and Julia Fractal Set considered a secure against quantum computing?
13 June 2019 5,042 25 View
Is the infrastructure in the world ready to replace traditional car by smart car(self drive car)?
04 June 2019 4,102 35 View
What are the future of traditional authentication protocols that are based on DH or RSA for securing the IoT, Fog and Edge computing in case of emergence of the quantum computing ?
13 May 2019 5,839 27 View