{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:34:18Z","timestamp":1777952058166,"version":"3.51.4"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.063","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"541-549","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["End-to-End Conformer Neural Networks for Multilingual Automatic Speech Recognition and Understanding"],"prefix":"10.1016","volume":"275","author":[{"given":"Hassan","family":"AlMashhadani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alaa A.","family":"Alsaffar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hillal Ali","family":"AlMaqbali","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmed","family":"Al-Amayreh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"15","key":"10.1016\/j.procs.2026.01.063_bib1","doi-asserted-by":"crossref","first-page":"10789","DOI":"10.1007\/s00500-023-07824-7","article-title":"\u201cMobile robot: automatic speech recognition application for automation and STEM education,\u201d","volume":"27","author":"Tran","year":"2023","journal-title":"Soft comput"},{"issue":"11","key":"10.1016\/j.procs.2026.01.063_bib2","doi-asserted-by":"crossref","first-page":"8514","DOI":"10.3390\/su15118514","article-title":"\u201cAcceptance of Mobile Learning Technology by Teachers: Influencing Mobile Self-Efficacy and 21st-Century Skills-Based Training,\u201d","volume":"15","author":"Dahri","year":"2023","journal-title":"Sustainability"},{"key":"10.1016\/j.procs.2026.01.063_bib3","doi-asserted-by":"crossref","unstructured":"W. Sun, \u201cThe impact of automatic speech recognition technology on second language pronunciation and speaking skills of EFL learners: a mixed methods investigation,\u201d Front Psychol, vol. 14, Aug. 2023, doi: 10.3389\/fpsyg.2023.1210187.","DOI":"10.3389\/fpsyg.2023.1210187"},{"issue":"2","key":"10.1016\/j.procs.2026.01.063_bib4","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1080\/07380569.2022.2124752","article-title":"\u201cBeliefs and Knowledge for Pre-Service Teachers\u2019 Technology Integration during Teaching Practice: An Extended Theory of Planned Behavior,\u201d","volume":"40","author":"Habibi","year":"2023","journal-title":"Computers in the Schools"},{"issue":"5\u20136","key":"10.1016\/j.procs.2026.01.063_bib5","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1080\/09588221.2021.1952272","article-title":"\u201cMobile-assisted pronunciation learning with feedback from peers and\/or automatic speech recognition: a mixed-methods study,\u201d","volume":"36","author":"Dai","year":"2023","journal-title":"Comput Assist Lang Learn"},{"issue":"2","key":"10.1016\/j.procs.2026.01.063_bib6","doi-asserted-by":"crossref","first-page":"ep350","DOI":"10.30935\/cedtech\/11525","article-title":"\u201cSystem Quality and Student\u2019s Acceptance of the E-learning System: The Serial Mediation of Perceived Usefulness and Intention to Use,\u201d","volume":"14","author":"Alkhawaja","year":"2022","journal-title":"Contemp Educ Technol"},{"issue":"14","key":"10.1016\/j.procs.2026.01.063_bib7","doi-asserted-by":"crossref","first-page":"10237","DOI":"10.1007\/s00500-023-08277-8","article-title":"\u201cDevelopment of speech recognition system for remote vocal music teaching based on Markov model,\u201d","volume":"27","author":"Xu","year":"2023","journal-title":"Soft comput"},{"issue":"3","key":"10.1016\/j.procs.2026.01.063_bib8","first-page":"186","article-title":"\u201cAvailability of Voice-Recognition Devices to Support Visually Impaired Students in Saudi Arabian Universities,\u201d","volume":"14","author":"Khasawneh","year":"2023","journal-title":"J Wirel Mob Netw Ubiquitous Comput Dependable Appl"},{"issue":"15","key":"10.1016\/j.procs.2026.01.063_bib9","doi-asserted-by":"crossref","first-page":"22759","DOI":"10.1007\/s11042-023-14680-y","article-title":"\u201cEnd-to-end emotional speech recognition using acoustic model adaptation based on knowledge distillation,\u201d","volume":"82","author":"Yun","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.procs.2026.01.063_bib10","doi-asserted-by":"crossref","first-page":"136063","DOI":"10.1109\/ACCESS.2023.3337435","article-title":"\u201cICAPD Framework and simAM-YOLOv8n for Student Cognitive Engagement Detection in Classroom,\u201d","volume":"11","author":"Xu","year":"2023","journal-title":"IEEE Access"},{"issue":"23\u201324","key":"10.1016\/j.procs.2026.01.063_bib11","doi-asserted-by":"crossref","first-page":"13873","DOI":"10.1007\/s00500-023-08550-w","article-title":"\u201cDesign of English teaching speech recognition system based on LSTM network and feature extraction,\u201d","volume":"28","author":"Geng","year":"2024","journal-title":"Soft comput"},{"issue":"1","key":"10.1016\/j.procs.2026.01.063_bib12","doi-asserted-by":"crossref","first-page":"48","DOI":"10.4218\/etrij.2023-0322","article-title":"\u201cAI\u2010based language tutoring systems with end\u2010to\u2010end automatic speech recognition and proficiency evaluation,\u201d","volume":"46","author":"Kang","year":"2024","journal-title":"ETRI Journal"},{"key":"10.1016\/j.procs.2026.01.063_bib13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.aej.2024.10.065","article-title":"\u201cTransforming English language learning: Advanced speech recognition with MLP-LSTM for personalized education,\u201d","volume":"111","author":"Orosoo","year":"2025","journal-title":"Alexandria Engineering Journal"},{"key":"10.1016\/j.procs.2026.01.063_bib14","doi-asserted-by":"crossref","first-page":"128711","DOI":"10.1016\/j.neucom.2024.128711","article-title":"\u201cESERNet: Learning spectrogram structure relationship for effective speech emotion recognition with swin transformer in classroom discourse analysis,\u201d","volume":"612","author":"Liu","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.procs.2026.01.063_bib15","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/3606068","article-title":"\u201cAn Intelligent Proposed Model for Task Offloading in Fog-Cloud Collaboration Using Logistics Regression,\u201d","author":"Bukhari","year":"2022","journal-title":"Comput Intell Neurosci"},{"key":"10.1016\/j.procs.2026.01.063_bib16","doi-asserted-by":"crossref","unstructured":"Y. Ren et al., \u201cMachine learning-based prediction of elliptical double steel columns under compression loading,\u201d J Big Data, vol. 12, no. 1, 2025, doi: 10.1186\/s40537-025-01081-1.","DOI":"10.1186\/s40537-025-01081-1"},{"key":"10.1016\/j.procs.2026.01.063_bib17","doi-asserted-by":"crossref","first-page":"70791","DOI":"10.1109\/ACCESS.2025.3560567","article-title":"\u201cThe Effect of AI Gamification on Students\u2019 Engagement and Academic Achievement in Malaysia: SEM Analysis Perspectives,\u201d","volume":"13","author":"Ahmed Dahri","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.063_bib18","doi-asserted-by":"crossref","unstructured":"M. Elhenawy et al., Eyeballing Combinatorial Problems: A Case Study of Using Multimodal Large Language Models to Solve Traveling Salesman Problems, vol. 1268 LNNS. 2024. doi: 10.1007\/978-3-031-82377-0_29.","DOI":"10.1007\/978-3-031-82377-0_29"},{"key":"10.1016\/j.procs.2026.01.063_bib19","doi-asserted-by":"crossref","unstructured":"A. M. A. Al-Tarawneh, R. A. Alomoush, T. Ul Islam, J. I. Janjua, T. Abbas, and A. Ihsan, \u201cCurrent Trends in Artificial Intelligence for Educational Advancements,\u201d in 2024 International Conference on Decision Aid Sciences and Applications, DASA 2024, 2024. doi: 10.1109\/DASA63652.2024.10836340.","DOI":"10.1109\/DASA63652.2024.10836340"},{"issue":"6","key":"10.1016\/j.procs.2026.01.063_bib20","doi-asserted-by":"crossref","first-page":"6642","DOI":"10.11591\/ijece.v14i6.pp6642-6655","article-title":"\u201cA comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments,\u201d","volume":"14","author":"Kanaker","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering (IJECE)"},{"issue":"2","key":"10.1016\/j.procs.2026.01.063_bib21","doi-asserted-by":"crossref","first-page":"100258","DOI":"10.1016\/j.jjimei.2024.100258","article-title":"\u201cHow could entertainment content marketing affect intention to use the metaverse? Empirical findings,\u201d","volume":"4","author":"Alsoud","year":"2024","journal-title":"International Journal of Information Management Data Insights"},{"key":"10.1016\/j.procs.2026.01.063_bib22","doi-asserted-by":"crossref","unstructured":"F. A. M. Al-Habies et al., \u201cTechnology engagement in enhancing memory functionality in elderly care centers,\u201d J Educ Health Promot, vol. 14, no. 1, Jan. 2025, doi: 10.4103\/jehp.jehp_455_24.","DOI":"10.4103\/jehp.jehp_455_24"},{"issue":"6","key":"10.1016\/j.procs.2026.01.063_bib23","doi-asserted-by":"crossref","first-page":"6958","DOI":"10.11591\/ijece.v14i6.pp6958-6968","article-title":"\u201cA significant features vector for internet traffic classification based on multi-features selection techniques and ranker, voting filters,\u201d","volume":"14","author":"Munther","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"4","key":"10.1016\/j.procs.2026.01.063_bib24","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.47738\/jads.v5i4.353","article-title":"\u201cArtificial Intelligence Techniques for Early Autism Detection in Toddlers: A Comparative Analysis,\u201d","volume":"5","author":"Shambour","year":"2024","journal-title":"Journal of Applied Data Sciences"},{"issue":"4","key":"10.1016\/j.procs.2026.01.063_bib25","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.47738\/jads.v5i4.323","article-title":"\u201cPerformance Comparison of Whale and Harris Hawks Optimizers with Network Intrusion Prevention Systems,\u201d","volume":"5","author":"Abualhaj","year":"2024","journal-title":"Journal of Applied Data Sciences"},{"key":"10.1016\/j.procs.2026.01.063_bib26","doi-asserted-by":"crossref","unstructured":"M. H. Aldulaimi, I. A. Ismail, I. M. Ahmed, Y. A. Yahya, Q. M. Kharma, and T. M. Ghazal, \u201cIntegrating Three Machine Learning Algorithms in Ensemble Learning Model for Improving Content-based Spam Email Recognition,\u201d Journal of Soft Computing and Data Mining, vol. 5, no. 2, Dec. 2024, doi: 10.30880\/jscdm.2024.05.02.014.","DOI":"10.30880\/jscdm.2024.05.02.014"},{"key":"10.1016\/j.procs.2026.01.063_bib27","doi-asserted-by":"crossref","unstructured":"A. A. Shlash Mohammad et al., \u201cEnhancing Metadata Management and Data-Driven Decision-Making in Sustainable Food Supply Chains Using Blockchain And AI Technologies,\u201d Data and Metadata, vol. 4, 2025, doi: 10.56294\/dm2025683.","DOI":"10.56294\/dm2025683"},{"key":"10.1016\/j.procs.2026.01.063_bib28","doi-asserted-by":"crossref","unstructured":"A. A. Shlash Mohammad et al., \u201cMachine Learning Models for Predicting Employee Attrition: A Data Science Perspective,\u201d Data and Metadata, vol. 4, 2025, doi: 10.56294\/DM2025669.","DOI":"10.56294\/dm2025669"},{"key":"10.1016\/j.procs.2026.01.063_bib29","doi-asserted-by":"crossref","unstructured":"S. Abuowaida et al., \u201cEvidence Detection in Cloud Forensics: Classifying Cyber-Attacks in IaaS Environments using machine learning,\u201d Data and Metadata, vol. 4, 2025, doi: 10.56294\/dm2025699.","DOI":"10.56294\/dm2025699"},{"key":"10.1016\/j.procs.2026.01.063_bib30","doi-asserted-by":"crossref","DOI":"10.1002\/itl2.646","article-title":"\u201cImproving Reliability and Data Management in Internet of Things Based Wireless Sensor Networks,\u201d","author":"Babaker","year":"2025","journal-title":"Internet Technology Letters"},{"key":"10.1016\/j.procs.2026.01.063_bib31","doi-asserted-by":"crossref","first-page":"26273","DOI":"10.1109\/ACCESS.2025.3529894","article-title":"\u201cFederated Conditional Variational Auto Encoders for Cyber Threat Intelligence: Tackling Non-IID Data in SDN Environments,\u201d","volume":"13","author":"Kazmi","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.063_bib32","doi-asserted-by":"crossref","unstructured":"R. Al-Dmour, H. Al-Dmour, E. Basheer Amin, and A. Al-Dmour, \u201cImpact of AI and big data analytics on healthcare outcomes: An empirical study in Jordanian healthcare institutions,\u201d Digit Health, vol. 11, 2025, doi: 10.1177\/20552076241311051.","DOI":"10.1177\/20552076241311051"},{"key":"10.1016\/j.procs.2026.01.063_bib33","doi-asserted-by":"crossref","unstructured":"A. Y. Areiqat, Leveraging AI and FinTech: Driving Business Innovation in the Fourth Industrial Revolution, vol. 158. 2025. doi: 10.1007\/978-3-031-70855-8_60.","DOI":"10.1007\/978-3-031-70855-8_60"},{"issue":"3","key":"10.1016\/j.procs.2026.01.063_bib34","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.11591\/eei.v14i3.9095","article-title":"\u201cDriving behavior analytics: an intelligent system based on machine learning and data mining techniques,\u201d","volume":"14","author":"Arabiat","year":"2025","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"10.1016\/j.procs.2026.01.063_bib35","doi-asserted-by":"crossref","first-page":"41336","DOI":"10.1109\/ACCESS.2025.3547914","article-title":"\u201cHybrid Deep Learning for Human Fall Detection: A Synergistic Approach Using YOLOv8 and Time-Space Transformers,\u201d","volume":"13","author":"Sanjalawe","year":"2025","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.procs.2026.01.063_bib36","first-page":"231","article-title":"\u201cHashing generation using recurrent neural networks for text documents,\u201d","volume":"12","author":"Zitar","year":"2021","journal-title":"ICIC Express Lett. Part B Appl."},{"issue":"6","key":"10.1016\/j.procs.2026.01.063_bib37","first-page":"300","article-title":"\u201cKnowledge distribution in multi agent systems,\u201d","volume":"11","author":"Teahan","year":"2012","journal-title":"Asian J. Inf. Technol."},{"key":"10.1016\/j.procs.2026.01.063_bib38","first-page":"2013","article-title":"\u201cMachine Learning-Based Intrusion Detection Approaches for Secured Internet of Things,\u201d in","volume":"1056","author":"Ghazal","year":"2023","journal-title":"Stud. Comput. Intell."},{"key":"10.1016\/j.procs.2026.01.063_bib39","doi-asserted-by":"crossref","DOI":"10.1109\/MACS56771.2022.10022662","article-title":"\u201cThe Application of HCI in Industry and IT,\u201d in","author":"Ghazal","year":"2022","journal-title":"Proc. 14th Int. Conf. Math. Actuarial Sci. Comput. Sci. Stat. (MACS)"},{"issue":"2","key":"10.1016\/j.procs.2026.01.063_bib40","doi-asserted-by":"crossref","first-page":"687","DOI":"10.3390\/su17020687","article-title":"\u201cExploring the Mediating Role of Information Security Culture in Enhancing Sustainable Practices Through Integrated Systems Infrastructure,\u201d","volume":"17","author":"Hassan","year":"2025","journal-title":"Sustainability Switzerland"},{"issue":"1","key":"10.1016\/j.procs.2026.01.063_bib41","doi-asserted-by":"crossref","first-page":"5559234","DOI":"10.1155\/hbe2\/5559234","article-title":"\u201cCyber Shopping Beyond Boundaries: The Metaverse Revolution in e-Commerce and Consumer Behavior,\u201d","volume":"2025","author":"Jafar","year":"2025","journal-title":"Hum Behav Emerg Technol"},{"key":"10.1016\/j.procs.2026.01.063_bib42","article-title":"\u201cThe Present and Future Trends of Leadership Styles and Knowledge Hiding Through Science Mapping Analysis,\u201d","volume":"2550040","author":"Fauzi","year":"2025","journal-title":"Journal of Information and Knowledge Management"},{"issue":"24","key":"10.1016\/j.procs.2026.01.063_bib43","doi-asserted-by":"crossref","first-page":"13813","DOI":"10.3390\/su132413813","article-title":"\u201cUniversity Students Intention to Continue Using Online Learning Tools and Technologies: An International Comparison,\u201d","volume":"13","author":"Soria-Barreto","year":"2021","journal-title":"Sustainability"},{"key":"10.1016\/j.procs.2026.01.063_bib44","doi-asserted-by":"crossref","unstructured":"A. M. A. Al-Tarawneh, \u201cAn Analysis of the Positive and Negative Effects of Cyberpsychotherapy: A Systematic Review,\u201d in 2024 2nd International Conference on Cyber Resilience (ICCR), IEEE, Feb. 2024, pp. 1\u20134. doi: 10.1109\/iccr61006.2024.10533082.","DOI":"10.1109\/ICCR61006.2024.10533082"},{"key":"10.1016\/j.procs.2026.01.063_bib45","doi-asserted-by":"crossref","unstructured":"S. Abunasrieh, H. A. Alqeisi, D. Y. Akileh, and A. M. A. Al-Tarawneh, \u201cExploring the Role of Artificial Intelligence Applications in Developing Clinical Psychological Research: Implications and Future Aspirations,\u201d in 2024 2nd International Conference on Cyber Resilience (ICCR), IEEE, Feb. 2024, pp. 1\u20135. doi: 10.1109\/iccr61006.2024.10533036.","DOI":"10.1109\/ICCR61006.2024.10533036"},{"key":"10.1016\/j.procs.2026.01.063_bib46","doi-asserted-by":"crossref","unstructured":"D. Masri, L. Jaber, R. Mashal, F. Albourini, M. A. Alsaoud, and A. M. A. Al-Tarawneh, \u201cThe Role of Wearables & Technology in Mental Health: Review,\u201d in 2nd International Conference on Cyber Resilience, ICCR 2024, 2024. doi: 10.1109\/ICCR61006.2024.10532880.","DOI":"10.1109\/ICCR61006.2024.10532880"},{"key":"10.1016\/j.procs.2026.01.063_bib47","doi-asserted-by":"crossref","unstructured":"R. Tassnim, R. A. Tawfic Ja\u2019far, and A. M. A. Al-Tarawneh, \u201cAnalyzing the Challenges Facing Digital Mental Health (DMH) Between Aspiration and Reality,\u201d in 2024 2nd International Conference on Cyber Resilience (ICCR), IEEE, Feb. 2024, pp. 1\u20135. doi: 10.1109\/iccr61006.2024.10533151.","DOI":"10.1109\/ICCR61006.2024.10533151"},{"key":"10.1016\/j.procs.2026.01.063_bib48","doi-asserted-by":"crossref","unstructured":"E. Al-Hyasat and T. I. Alhadidi, \u201cEvaluating the performance of implementing regionally coordinating bus priority signals under different control schemes,\u201d Computational Urban Science, vol. 4, no. 1, Aug. 2024, doi: 10.1007\/s43762-024-00131-3.","DOI":"10.1007\/s43762-024-00131-3"},{"issue":"6","key":"10.1016\/j.procs.2026.01.063_bib49","doi-asserted-by":"crossref","first-page":"6423","DOI":"10.11591\/ijece.v14i6.pp6423-6432","article-title":"\u201cTime and wavelength diversity schemes for transdermal optical wireless links,\u201d","volume":"14","author":"Almajdoubah","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"10.1016\/j.procs.2026.01.063_bib50","article-title":"\u201cEnglish Speech Recognition Dataset.\u201d","volume":"10","year":"2025","journal-title":"Accessed: Sep."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000633?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000633?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:28:14Z","timestamp":1777894094000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":50,"alternative-id":["S1877050926000633"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.063","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"End-to-End Conformer Neural Networks for Multilingual Automatic Speech Recognition and Understanding","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.063","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}