19 Questions 606 Answers 0 Followers
Questions related from Zeyad Mohammad
The fluctuation in the teaching process from traditional to e-learning and vice versa. Is it a feasible process for teaching?
24 September 2020 8,715 97 View
It is affecting negatively/positively the quality of education
28 July 2020 6,082 92 View
What is the best video conference application (Zoom, Team, Google classroom, ... etc) in terms of security?
03 April 2020 9,078 70 View
What are the secrets to successful university education?
02 February 2020 5,583 90 View
How can we adapt the new technologies to serve traditional education in educational institutions in order to attract students?
27 December 2019 8,523 92 View
the questions ask about your favorite. Do you think these questions may reveal your privacy?
05 October 2019 6,325 89 View
The wars in the future will use drones and robotics for fighting the enemy. Is this possible?
03 October 2019 9,377 67 View
What is your opinion on the internationalization of university study?
13 August 2019 9,053 92 View
Digitalization of all documents in universities. Is it helping to cut time processing documents?
10 August 2019 5,720 84 View
Is it possible to implement ECC bilinear pairing in WSN?
15 July 2019 6,642 28 View
Which master degree program is better the comprehensive track or thesis track?
08 July 2019 6,607 36 View
What is the formal website that is used for testing IoT application vulnerabilities?
08 July 2019 2,192 15 View
What are the research directions in Smart Farm?
01 July 2019 2,507 28 View
Did the traditional war replace with cyber warfare?
01 July 2019 3,726 47 View
What are the research directions in Cyber-security for Mobile Service Robots?
01 July 2019 7,563 24 View
Do you trust the IoT applications in terms of the implemented security?
14 June 2019 2,381 55 View
Is the Mandelbrot and Julia Fractal Set considered a secure against quantum computing?
13 June 2019 5,005 25 View
Is the infrastructure in the world ready to replace traditional car by smart car(self drive car)?
04 June 2019 4,040 35 View
What are the future of traditional authentication protocols that are based on DH or RSA for securing the IoT, Fog and Edge computing in case of emergence of the quantum computing ?
13 May 2019 5,745 27 View