Artificial intelligence enabled project management: a systematic literature review

I Taboada, A Daneshpajouh, N Toledo, T De Vass - Applied Sciences, 2023 - mdpi.com
In the Industry 5.0 era, companies are leveraging the potential of cutting-edge technologies
such as artificial intelligence for more efficient and green human-centric production. In a …

Deep learning for iris recognition: A survey

K Nguyen, H Proença, F Alonso-Fernandez - ACM Computing Surveys, 2024 - dl.acm.org
In this survey, we provide a comprehensive review of more than 200 articles, technical
reports, and GitHub repositories published over the last 10 years on the recent …

Customer profiling, segmentation, and sales prediction using AI in direct marketing

MSE Kasem, M Hamada, I Taj-Eddin - Neural Computing and Applications, 2024 - Springer
In the current business environment, where the customer is the primary focus, effective
communication between marketing and senior management is vital for success. Effective …

A deep learning technique to detect distributed denial of service attacks in software-defined networks

WG Gadallah, HM Ibrahim, NM Omar - Computers & Security, 2024 - Elsevier
Abstract Software-Defined Network (SDN) is an established networking paradigm that
separates the control plane from the data plane. It has central network control, and …

[HTML][HTML] Integrating sustainability metrics into project and portfolio performance assessment in agile software development: A data-driven scoring model

C Fagarasan, C Cristea, M Cristea, O Popa, A Pisla - Sustainability, 2023 - mdpi.com
In today's rapidly evolving information technology sectors, agile methodologies have been
employed by software development organizations to facilitate the large-scale, efficient, and …

Ae-lstm: Autoencoder with lstm-based intrusion detection in iot

M Mahmoud, M Kasem, A Abdallah… - … Conference (ITC-Egypt …, 2022 - ieeexplore.ieee.org
The acceleration in the field of the Internet of things had increased security problems, so we
find ourselves in need of effective ways to protect IoT systems From intrusions. Recently …

Kohtd: Kazakh offline handwritten text dataset

N Toiganbayeva, M Kasem, G Abdimanap… - Signal Processing …, 2022 - Elsevier
Despite the transition to digital information exchange, many documents, such as invoices,
taxes, memos and questionnaires, historical data, and answers to exam questions, still …

[HTML][HTML] Ganmasker: a two-stage generative adversarial network for high-quality face mask removal

M Mahmoud, HS Kang - Sensors, 2023 - mdpi.com
Deep-learning-based image inpainting methods have made remarkable advancements,
particularly in object removal tasks. The removal of face masks has gained significant …

Advancements and challenges in arabic optical character recognition: A comprehensive survey

MSE Kasem, M Mahmoud, HS Kang - arxiv preprint arxiv:2312.11812, 2023 - arxiv.org
Optical character recognition (OCR) is a vital process that involves the extraction of
handwritten or printed text from scanned or printed images, converting it into a format that …

A Comprehensive Survey of Masked Faces: Recognition, Detection, and Unmasking

M Mahmoud, MSE Kasem, HS Kang - arxiv preprint arxiv:2405.05900, 2024 - arxiv.org
Masked face recognition (MFR) has emerged as a critical domain in biometric identification,
especially by the global COVID-19 pandemic, which introduced widespread face masks …