{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:34:14Z","timestamp":1777952054854,"version":"3.51.4"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:00:00Z","timestamp":1769731200000},"content-version":"vor","delay-in-days":29,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.011","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"82-91","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Multi-Domain Benchmarking Frameworks for Comparative Analysis of Neural Language Processing Architectures"],"prefix":"10.1016","volume":"275","author":[{"given":"Priya","family":"Vij","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ashu","family":"Nayak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.01.011_bib1","doi-asserted-by":"crossref","unstructured":"Elhenawy M, Ashqar HI, Rakotonirainy A, Alhadidi TI, Jaber A, Tami MA. Vision-Language Models for Autonomous Driving: CLIP-Based Dynamic Scene Understanding. Electronics (Basel) 2025;14:1282. https:\/\/doi.org\/10.3390\/electronics14071282.","DOI":"10.3390\/electronics14071282"},{"key":"10.1016\/j.procs.2026.01.011_bib2","doi-asserted-by":"crossref","unstructured":"Elhenawy M, Abdelhay A, Alhadidi TI, Ashqar HI, Jaradat S, Jaber A, et al. Eyeballing Combinatorial Problems: A Case Study of Using Multimodal Large Language Models to Solve Traveling Salesman Problems, 2025, p. 341\u201355. https:\/\/doi.org\/10.1007\/978-3-031-82377-0_29.","DOI":"10.1007\/978-3-031-82377-0_29"},{"key":"10.1016\/j.procs.2026.01.011_bib3","doi-asserted-by":"crossref","unstructured":"Aljamani S, Hassona Y, Fansa HA, M. Saadeh H, Dafi Jamani K. Evaluating Large Language Models in Addressing Patient Questions on Endodontic Pain: A Comparative Analysis of Accessible Chatbots. J Endod 2025;51:1617\u201324. https:\/\/doi.org\/10.1016\/j.joen.2025.04.015.","DOI":"10.1016\/j.joen.2025.04.015"},{"key":"10.1016\/j.procs.2026.01.011_bib4","doi-asserted-by":"crossref","unstructured":"Fauzi MA, Alias UN, Nya-Ling Tan C, Wider W, Mukherjee S, Al-Adwan AS, et al. The Present and Future Trends of Leadership Styles and Knowledge Hiding Through Science Mapping Analysis. Journal of Information & Knowledge Management 2025;24. https:\/\/doi.org\/10.1142\/S0219649225500406.","DOI":"10.1142\/S0219649225500406"},{"key":"10.1016\/j.procs.2026.01.011_bib5","doi-asserted-by":"crossref","unstructured":"Zhu Y, Lin X, Kim J, Al-Adwan AS, Li N. Exploring Human Interaction in Online Self-Regulated Learning Through Danmaku Comments. Int J Hum Comput Interact 2025;41:13964\u201377. https:\/\/doi.org\/10.1080\/10447318.2025.2480826.","DOI":"10.1080\/10447318.2025.2480826"},{"key":"10.1016\/j.procs.2026.01.011_bib6","doi-asserted-by":"crossref","unstructured":"Reed SM. An active learning convolutional neural network for predicting river flow in a human impacted system. Frontiers in Water 2023;5. https:\/\/doi.org\/10.3389\/frwa.2023.1271780.","DOI":"10.3389\/frwa.2023.1271780"},{"key":"10.1016\/j.procs.2026.01.011_bib7","doi-asserted-by":"crossref","unstructured":"Ganakwar AS. DESIGN AND DEVELOPMENT OF SPEECH DATABASE FOR DIGIT AND VOWELS IN SANSKRIT LANGUAGE AND RECOGNITION SYSTEM USING MACHINE LEARNING. Futuristic Trends in Information Technology Volume 3 Book 1, Iterative International Publisher, Selfypage Developers Pvt Ltd; 2024, p. 81\u2013100. https:\/\/doi.org\/10.58532\/V3BBIT1P1CH7.","DOI":"10.58532\/V3BBIT1P1CH7"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib8","doi-asserted-by":"crossref","first-page":"797","DOI":"10.5267\/j.ijdns.2023.12.024","article-title":"\u201cCan companies in digital marketing benefit from artificial intelligence in content creation?,\u201d","volume":"8","author":"Ahmad","year":"2024","journal-title":"International Journal of Data and Network Science"},{"key":"10.1016\/j.procs.2026.01.011_bib9","doi-asserted-by":"crossref","unstructured":"M. Maaz, G. N. Ahmed, A. S. Al-Shamayleh, A. Akhundzada, S. Siddiqui, and A. H. Al-Ghushami, \u201cEmpowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security,\u201d IEEE Access, 2024, doi: 10.1109\/ACCESS.2024.3482005.","DOI":"10.1109\/ACCESS.2024.3482005"},{"issue":"13","key":"10.1016\/j.procs.2026.01.011_bib10","doi-asserted-by":"crossref","first-page":"37295","DOI":"10.1007\/s11042-023-16889-3","article-title":"\u201cA novel secure cryptography model for data transmission based on Rotor64 technique,\u201d","volume":"83","author":"Obeidat","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.procs.2026.01.011_bib11","doi-asserted-by":"crossref","unstructured":"Z. Salah, H. A. Abu Owida, E. Abu Elsoud, E. Alhenawi, S. Abuowaida, and N. F. F. Alshdaifat, \u201cAn Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form,\u201d Future Internet, vol. 16, no. 11, 2024, doi: 10.3390\/fi16110414.","DOI":"10.3390\/fi16110414"},{"issue":"4","key":"10.1016\/j.procs.2026.01.011_bib12","first-page":"924","article-title":"\u201cEnhancing Threat Detection in Financial Cyber Security Through Auto Encoder-MLP Hybrid Models,\u201d","volume":"15","author":"Al-Mahadeen","year":"2024","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"5","key":"10.1016\/j.procs.2026.01.011_bib13","doi-asserted-by":"crossref","first-page":"6036","DOI":"10.11591\/ijece.v14i5.pp6036-6046","article-title":"\u201cEnhancing internet of things security: evaluating machine learning classifiers for attack prediction,\u201d","volume":"14","author":"Arabiat","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"1","key":"10.1016\/j.procs.2026.01.011_bib14","doi-asserted-by":"crossref","first-page":"118","DOI":"10.15849\/IJASCA.240330.07","article-title":"\u201cInnovative Malware Detection: Practical Swarm Optimization and fuzzyKNN Model in Honeypot Environment,\u201d","volume":"16","author":"Othman","year":"2024","journal-title":"International Journal of Advances in Soft Computing and its Applications"},{"issue":"3","key":"10.1016\/j.procs.2026.01.011_bib15","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.11591\/ijeecs.v35.i3.pp1773-1785","article-title":"\u201cOptimizing blockchain for healthcare IoT: a practical guide to navigating scalability, privacy, and efficiency trade-offs,\u201d","volume":"35","author":"AlHija","year":"2024","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib16","first-page":"2273","article-title":"\u201cTuning the K value in K-nearest neighbors for malware detection,\u201d","volume":"13","author":"Abualhaj","year":"2024","journal-title":"IAES International Journal of Artificial Intelligence"},{"key":"10.1016\/j.procs.2026.01.011_bib17","doi-asserted-by":"crossref","unstructured":"G. Kiran Kumar et al., \u201cAn optimized meta-heuristic clustering-based routing scheme for secured wireless sensor networks,\u201d International Journal of Communication Systems, vol. 37, no. 11, 2024, doi: 10.1002\/dac.5791.","DOI":"10.1002\/dac.5791"},{"key":"10.1016\/j.procs.2026.01.011_bib18","doi-asserted-by":"crossref","unstructured":"M. Abd Elaziz et al., \u201cEvolution toward intelligent communications: Impact of deep learning applications on the future of 6G technology,\u201d Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 14, no. 1, 2024, doi: 10.1002\/widm.1521.","DOI":"10.1002\/widm.1521"},{"key":"10.1016\/j.procs.2026.01.011_bib19","first-page":"1","article-title":"\"Transfer Learning Approach for Detecting Keylogging Attack on the Internet of Things,\"","author":"Maz","year":"2024","journal-title":"2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA), Sana\u2019a, Yemen"},{"issue":"21","key":"10.1016\/j.procs.2026.01.011_bib20","doi-asserted-by":"crossref","first-page":"59887","DOI":"10.1007\/s11042-023-17886-2","article-title":"\u201cModified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System,\u201d","volume":"83","author":"Abualigah","year":"2024","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib21","doi-asserted-by":"crossref","first-page":"733","DOI":"10.5267\/j.ijdns.2024.1.005","article-title":"\u201cA fine-tuning of decision tree classifier for ransomware detection based on memory data,\u201d","volume":"8","author":"Abualhaj","year":"2024","journal-title":"International Journal of Data and Network Science"},{"key":"10.1016\/j.procs.2026.01.011_bib22","doi-asserted-by":"crossref","first-page":"87090","DOI":"10.1109\/ACCESS.2025.3570901","article-title":"\u201cA New Hybrid PSO-HHO Wrapper Based Optimization for Feature Selection,\u201d","volume":"13","author":"Azeem","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.011_bib23","doi-asserted-by":"crossref","unstructured":"N. M. S. E. Saeed et al., \u201cUnveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review,\u201d 2024. doi: 10.1109\/ICCR61006.2024.10533066.","DOI":"10.1109\/ICCR61006.2024.10533066"},{"issue":"3","key":"10.1016\/j.procs.2026.01.011_bib24","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.14569\/IJACSA.2024.01503126","article-title":"\u201cThe Effect of Pre-processing on a Convolutional Neural Network Model for Dorsal Hand Vein Recognition,\u201d","volume":"15","author":"Tarawneh","year":"2024","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.1016\/j.procs.2026.01.011_bib25","doi-asserted-by":"crossref","unstructured":"Akhundzada, A. S. Al-Shamayleh, S. Zeadally, A. S. Almogren, and A. A. Abu-Shareha, \u201cDesign and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles,\u201d Computers and Electrical Engineering, vol. 119, 2024, doi: 10.1016\/j.compeleceng.2024.109609.","DOI":"10.1016\/j.compeleceng.2024.109609"},{"issue":"1","key":"10.1016\/j.procs.2026.01.011_bib26","doi-asserted-by":"crossref","first-page":"263","DOI":"10.14569\/IJACSA.2024.0150125","article-title":"\u201cPerformance Evaluation of Machine Learning Classifiers for Predicting Denial-of-Service Attack in Internet of Things,\u201d","volume":"15","author":"Almomani","year":"2024","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib27","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.32604\/cmc.2024.057673","article-title":"\u201cClassification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems,\u201d","volume":"81","author":"Almaiah","year":"2024","journal-title":"Computers, Materials and Continua"},{"key":"10.1016\/j.procs.2026.01.011_bib28","first-page":"1","article-title":"\"Analyzing the Challenges Facing Digital Mental Health (DMH) Between Aspiration and Reality,\"","author":"Tassnim","year":"2024","journal-title":"2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates"},{"key":"10.1016\/j.procs.2026.01.011_bib29","doi-asserted-by":"crossref","unstructured":"L. H. Baniata, S. Kang, M. A. Alsharaiah, and M. Baniata, \u201cAdvanced Deep Learning Model for Predicting the Academic Performances of Students in Educational Institutions,\u201d Applied Sciences (Switzerland), vol. 14, no. 5, 2024, doi: 10.3390\/app14051963.","DOI":"10.3390\/app14051963"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib30","doi-asserted-by":"crossref","first-page":"5259","DOI":"10.1109\/TCE.2025.3573033","article-title":"\u201cFederated Learning With Small and Large Models With Privacy-Preserving Data Space for Holographic Internet of Things in Consumer Electronics,\u201d","volume":"71","author":"Ghazal","year":"2025","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib31","doi-asserted-by":"crossref","first-page":"3413","DOI":"10.1109\/TCE.2025.3572629","article-title":"\u201cGenerative Federated Learning With Small and Large Models in Consumer Electronics for Privacy-Preserving Data Fusion in Healthcare Internet of Things,\u201d","volume":"71","author":"Ghazal","year":"2025","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.procs.2026.01.011_bib32","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1109\/ICEEE62185.2024.10779310","article-title":"\"Enhancing Malware Detection with Firefly and Grey Wolf Optimization Algorithms,\"","author":"Abu-Shareha","year":"2024","journal-title":"2024 11th International Conference on Electrical and Electronics Engineering (ICEEE), Marmaris, Turkiye"},{"issue":"6","key":"10.1016\/j.procs.2026.01.011_bib33","doi-asserted-by":"crossref","first-page":"17093","DOI":"10.1007\/s11042-023-16068-4","article-title":"\u201cMobile money fraud detection using data analysis and visualization techniques,\u201d","volume":"83","author":"Al-Sayyed","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.procs.2026.01.011_bib34","first-page":"1","article-title":"\"Overview of Challenges Faced by Digital Forensic,\"","author":"Fakhouri","year":"2024","journal-title":"2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates"},{"issue":"12","key":"10.1016\/j.procs.2026.01.011_bib35","doi-asserted-by":"crossref","first-page":"34351","DOI":"10.1007\/s11042-023-16971-w","article-title":"\u201cAn optimal task scheduling method in IoT-Fog-Cloud network using multi-objective moth-flame algorithm,\u201d","volume":"83","author":"Salehnia","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.procs.2026.01.011_bib36","doi-asserted-by":"crossref","unstructured":"T. Sridevi et al., \u201cAn opportunistic energy-efficient dynamic self-configuration clustering algorithm in WSN-based IoT networks,\u201d International Journal of Communication Systems, vol. 37, no. 1, 2024, doi: 10.1002\/dac.5633.","DOI":"10.1002\/dac.5633"},{"key":"10.1016\/j.procs.2026.01.011_bib37","first-page":"1","article-title":"\"Critical Evaluation of the Role of Cloud Systems and Networking in the Security and Growth of the Business Market,\"","author":"Fakhouri","year":"2024","journal-title":"2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib38","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.5267\/j.ijdns.2023.11.007","article-title":"\u201cExploring the role of digital citizenship and digital empowerment to enhance academic performance of business students,\u201d","volume":"8","author":"Al-Ali","year":"2024","journal-title":"International Journal of Data and Network Science"},{"issue":"3","key":"10.1016\/j.procs.2026.01.011_bib39","doi-asserted-by":"crossref","first-page":"2557","DOI":"10.32604\/cmes.2023.045170","article-title":"\u201cSynergistic Swarm Optimization Algorithm,\u201d","volume":"139","author":"Alzoubi","year":"2024","journal-title":"CMES - Computer Modeling in Engineering and Sciences"},{"key":"10.1016\/j.procs.2026.01.011_bib40","doi-asserted-by":"crossref","first-page":"41829","DOI":"10.1109\/ACCESS.2024.3377232","article-title":"\u201cTransformer-Based Named Entity Recognition in Construction Supply Chain Risk Management in Australia,\u201d","volume":"12","author":"Shishehgarkhaneh","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.011_bib41","doi-asserted-by":"crossref","unstructured":"M. Alsokkar, M. A. Otair, H. E. Alfar, A. Y. Nasereddin, K. Aldiabat, and L. M. Q. Abualigah, \u201cSentiment analysis for Arabic call center notes using machine learning techniques,\u201d Journal of Autonomous Intelligence, vol. 7, no. 3, 2024, doi: 10.32629\/jai.v7i3.940.","DOI":"10.32629\/jai.v7i3.940"},{"key":"10.1016\/j.procs.2026.01.011_bib42","doi-asserted-by":"crossref","first-page":"104977","DOI":"10.1109\/ACCESS.2025.3575610","article-title":"\u201cAbstractive Text Summarization in Arabic-Like Script Using Multi-Encoder Architecture and Semantic Extraction Techniques,\u201d","volume":"13","author":"Fatima","year":"2025","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.procs.2026.01.011_bib43","first-page":"188","article-title":"\u201cIntegrating Three Machine Learning Algorithms in Ensemble Learning Model for Improving Content-based Spam Email Recognition,\u201d","volume":"5","author":"Saeed","year":"2024","journal-title":"Journal of Soft Computing and Data Mining"},{"key":"10.1016\/j.procs.2026.01.011_bib44","doi-asserted-by":"crossref","unstructured":"M. A. Fauzi et al., \u201cThe Present and Future Trends of Leadership Styles and Knowledge Hiding Through Science Mapping Analysis,\u201d Journal of Information and Knowledge Management, vol. 24, no. 5, 2025, doi: 10.1142\/S0219649225500406.","DOI":"10.1142\/S0219649225500406"},{"key":"10.1016\/j.procs.2026.01.011_bib45","doi-asserted-by":"crossref","unstructured":"Pandya SB, Patel OS, Kumar A, Kalita K, Jangir P, Chohan JS, et al. Design optimization of safety transformer using decomposition-based multi-objective heat transfer search algorithm, 2024, p. 040014. https:\/\/doi.org\/10.1063\/5.0234601.","DOI":"10.1063\/5.0234601"},{"key":"10.1016\/j.procs.2026.01.011_bib46","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.17507\/tpls.1406.31","article-title":"Embedding Artificial Intelligent Applications in Higher Educational Institutions to Improve Students\u2019 Pronunciation Performance","volume":"14","author":"Al-Shallakh","year":"2024","journal-title":"Theory and Practice in Language Studies"},{"key":"10.1016\/j.procs.2026.01.011_bib47","doi-asserted-by":"crossref","unstructured":"Alhadidi T, Jaber A, Jaradat S, Ashqar H, Elhenawy M. Object Detection Using Oriented Window Learning Vision Transformer: Roadway Assets Recognition, 2025, p. 506\u201322. https:\/\/doi.org\/10.1007\/978-3-031-82377-0_41.","DOI":"10.1007\/978-3-031-82377-0_41"},{"key":"10.1016\/j.procs.2026.01.011_bib48","doi-asserted-by":"crossref","unstructured":"Guerbas F, Benmahamed Y, Teguar Y, Dahmani RA, Teguar M, Ali E, et al. Neural networks and particle swarm for transformer oil diagnosis by dissolved gas analysis. Sci Rep 2024;14:9271. https:\/\/doi.org\/10.1038\/s41598-024-60071-0.","DOI":"10.1038\/s41598-024-60071-0"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000116?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000116?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:28:23Z","timestamp":1777894103000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":48,"alternative-id":["S1877050926000116"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.011","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Multi-Domain Benchmarking Frameworks for Comparative Analysis of Neural Language Processing Architectures","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.011","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}