{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:34:16Z","timestamp":1777952056096,"version":"3.51.4"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"vor","delay-in-days":30,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.069","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"594-601","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Reinforcement-Learned Speech Enhancement Models for Real-Time Adaptive Human-Computer Interaction"],"prefix":"10.1016","volume":"275","author":[{"given":"Bidoor Noori","family":"Ishaq","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Naji Mutar","family":"Saheb","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aay Muwafaq","family":"Ismael","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maen","family":"Qaddoura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.procs.2026.01.069_bib1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s10772-023-10019-y","article-title":"\u201cAn approach for speech enhancement with dysarthric speech recognition using optimization based machine learning frameworks,\u201d","volume":"26","author":"Jolad","year":"2023","journal-title":"Int J Speech Technol"},{"issue":"2","key":"10.1016\/j.procs.2026.01.069_bib2","doi-asserted-by":"crossref","first-page":"3817","DOI":"10.32604\/cmc.2023.037380","article-title":"\u201cImproving Speech Enhancement Framework via Deep Learning,\u201d","volume":"75","author":"Hsiao","year":"2023","journal-title":"Computers, Materials & Continua"},{"key":"10.1016\/j.procs.2026.01.069_bib3","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/TASLP.2023.3328282","article-title":"\u201cAttention-Based Speech Enhancement Using Human Quality Perception Modeling,\u201d","volume":"32","author":"Nayem","year":"2024","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"10.1016\/j.procs.2026.01.069_bib4","doi-asserted-by":"crossref","first-page":"2351","DOI":"10.1109\/TASLP.2023.3285241","article-title":"\u201cSpeech Enhancement and Dereverberation With Diffusion-Based Generative Models,\u201d","volume":"31","author":"Richter","year":"2023","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"issue":"9","key":"10.1016\/j.procs.2026.01.069_bib5","doi-asserted-by":"crossref","first-page":"4394","DOI":"10.3390\/s23094394","article-title":"\u201cCharacterization of Deep Learning-Based Speech-Enhancement Techniques in Online Audio Processing Applications,\u201d","volume":"23","author":"Rascon","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.procs.2026.01.069_bib6","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TASLP.2023.3250846","article-title":"\u201cRadioSES: mmWave-Based Audioradio Speech Enhancement and Separation System,\u201d","volume":"31","author":"Ozturk","year":"2023","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"issue":"3","key":"10.1016\/j.procs.2026.01.069_bib7","doi-asserted-by":"crossref","first-page":"3647","DOI":"10.1007\/s11042-022-13302-3","article-title":"\u201cSpeech enhancement using long short term memory with trained speech features and adaptive wiener filter,\u201d","volume":"82","author":"Garg","year":"2023","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10.1016\/j.procs.2026.01.069_bib8","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1186\/s13636-023-00295-6","article-title":"\u201cChannel and temporal-frequency attention UNet for monaural speech enhancement,\u201d","volume":"2023","author":"Xu","year":"2023","journal-title":"EURASIP J Audio Speech Music Process"},{"issue":"4","key":"10.1016\/j.procs.2026.01.069_bib9","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1121\/10.0021887","article-title":"\u201cArray configuration-agnostic personalized speech enhancement using long-short-term spatial coherence,\u201d","volume":"154","author":"Hsu","year":"2023","journal-title":"J Acoust Soc Am"},{"issue":"1","key":"10.1016\/j.procs.2026.01.069_bib10","doi-asserted-by":"crossref","first-page":"e0291240","DOI":"10.1371\/journal.pone.0291240","article-title":"\u201cDeep causal speech enhancement and recognition using efficient long-short term memory Recurrent Neural Network,\u201d","volume":"19","author":"Li","year":"2024","journal-title":"PLoS One"},{"issue":"3","key":"10.1016\/j.procs.2026.01.069_bib11","doi-asserted-by":"crossref","first-page":"562","DOI":"10.3390\/jtaer16030034","article-title":"\u201cWhat makes consumers purchase mobile apps: Evidence from Jordan,\u201d","volume":"16","author":"Al-Adwan","year":"2021","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"key":"10.1016\/j.procs.2026.01.069_bib12","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/3606068","article-title":"\u201cAn Intelligent Proposed Model for Task Offloading in Fog-Cloud Collaboration Using Logistics Regression,\u201d","author":"Bukhari","year":"2022","journal-title":"Comput Intell Neurosci"},{"issue":"2","key":"10.1016\/j.procs.2026.01.069_bib13","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1080\/07380569.2022.2124752","article-title":"\u201cBeliefs and Knowledge for Pre-Service Teachers\u2019 Technology Integration during Teaching Practice: An Extended Theory of Planned Behavior,\u201d","volume":"40","author":"Habibi","year":"2023","journal-title":"Computers in the Schools"},{"key":"10.1016\/j.procs.2026.01.069_bib14","doi-asserted-by":"crossref","DOI":"10.1109\/ICAIC53980.2022.9896971","article-title":"\u201cSecuring Smart Cities Using Blockchain Technology,\u201d in","author":"Ghazal","year":"2022","journal-title":"Proc. 2022 1st Int. Conf. AI Cybersecurity (ICAIC)"},{"key":"10.1016\/j.procs.2026.01.069_bib15","doi-asserted-by":"crossref","first-page":"114172","DOI":"10.1109\/ACCESS.2023.3324210","article-title":"\u201cMulti-Attention Bottleneck for Gated Convolutional Encoder-Decoder-Based Speech Enhancement,\u201d","volume":"11","author":"Saleem","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.procs.2026.01.069_bib16","first-page":"1195","article-title":"\u201cDCT based densely connected convolutional GRU for real-time speech enhancement,\u201d","volume":"45","author":"Jannu","year":"2023","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"28","key":"10.1016\/j.procs.2026.01.069_bib17","doi-asserted-by":"crossref","first-page":"43903","DOI":"10.1007\/s11042-023-14945-6","article-title":"\u201cMetaRL-SE: a few-shot speech enhancement method based on meta-reinforcement learning,\u201d","volume":"82","author":"Zhou","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.procs.2026.01.069_bib18","doi-asserted-by":"crossref","first-page":"2477","DOI":"10.1109\/TASLP.2024.3393718","article-title":"\u201cCMGAN: Conformer-Based Metric-GAN for Monaural Speech Enhancement,\u201d","volume":"32","author":"Abdulatif","year":"2024","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"10.1016\/j.procs.2026.01.069_bib19","doi-asserted-by":"crossref","first-page":"104787","DOI":"10.1016\/j.dsp.2024.104787","article-title":"\u201cDeConformer-SENet: An efficient deformable conformer speech enhancement network,\u201d","volume":"156","author":"Li","year":"2025","journal-title":"Digit Signal Process"},{"key":"10.1016\/j.procs.2026.01.069_bib20","doi-asserted-by":"crossref","first-page":"101666","DOI":"10.1016\/j.csl.2024.101666","article-title":"\u201cSpeech emotion recognition in real static and dynamic human-robot interaction scenarios,\u201d","volume":"89","author":"Gr\u00e1geda","year":"2025","journal-title":"Comput Speech Lang"},{"key":"10.1016\/j.procs.2026.01.069_bib21","article-title":"\u201cSpeech Enhancement.\u201d","volume":"23","year":"2025","journal-title":"Accessed: Sep."},{"key":"10.1016\/j.procs.2026.01.069_bib22","unstructured":"Breynald. (n.d.). Speech Enhancement [Data set]. Kaggle. Retrieved September 23, 2025, from https:\/\/www.kaggle.com\/datasets\/breynald\/speech-enhancement."},{"key":"10.1016\/j.procs.2026.01.069_bib23","doi-asserted-by":"crossref","unstructured":"A. A. Rumman, A. M. Aljundi, and R. M. R. Al-Raqqad, \u201cBig Data Analytics: Driving Project Success, Continuity, and Sustainability,\u201d International Journal of Analysis and Applications, vol. 22, 2024, doi: 10.28924\/2291-8639-22-2024-167.","DOI":"10.28924\/2291-8639-22-2024-167"},{"issue":"6","key":"10.1016\/j.procs.2026.01.069_bib24","doi-asserted-by":"crossref","first-page":"206","DOI":"10.32479\/irmm.17345","article-title":"\u201cDeveloping Green Marketing Strategies: A Comprehensive Analysis of Consumer Behaviour and Business Practices,\u201d","volume":"14","author":"Mansour","year":"2024","journal-title":"International Review of Management and Marketing"},{"key":"10.1016\/j.procs.2026.01.069_bib25","first-page":"41829","article-title":"\u201cTransformer-Based Named Entity Recognition in Construction Supply Chain Risk Management in Australia,\u201d in IEEE Access","author":"Shishehgarkhaneh","year":"2024","journal-title":"MONASH University, Department of Civil Engineering, Melbourne, Australia: Institute of Electrical and Electronics Engineers Inc."},{"issue":"3","key":"10.1016\/j.procs.2026.01.069_bib26","doi-asserted-by":"crossref","first-page":"2862","DOI":"10.11591\/ijai.v13.i3.pp2862-2869","article-title":"\u201cAutomated detection of kidney masses lesions using a deep learning approach,\u201d","volume":"13","author":"Almahadin","year":"2024","journal-title":"IAES International Journal of Artificial Intelligence"},{"issue":"6","key":"10.1016\/j.procs.2026.01.069_bib27","doi-asserted-by":"crossref","first-page":"6642","DOI":"10.11591\/ijece.v14i6.pp6642-6655","article-title":"\u201cA comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments,\u201d","volume":"14","author":"Kanaker","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering (IJECE)"},{"issue":"8","key":"10.1016\/j.procs.2026.01.069_bib28","doi-asserted-by":"crossref","first-page":"22811","DOI":"10.1007\/s11042-023-16411-9","article-title":"\u201cA novel multi-objective wrapper-based feature selection method using quantum-inspired and swarm intelligence techniques,\u201d","volume":"83","author":"Zouache","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.procs.2026.01.069_bib29","first-page":"244","article-title":"\u201cEnhancing Network Intrusion Detection Systems Through Dimensionality Reduction,\u201d in Lecture Notes in Networks and Systems, vol","author":"Abualhaj","year":"2024","journal-title":"1078 LNNS, in Lecture notes in networks and systems, vol. 1078 LNNS., Cham: Springer Nature Switzerland"},{"issue":"10","key":"10.1016\/j.procs.2026.01.069_bib30","doi-asserted-by":"crossref","first-page":"e31592","DOI":"10.1016\/j.heliyon.2024.e31592","article-title":"\u201cBlockchain-powered grids: Paving the way for a sustainable and efficient future,\u201d","volume":"10","author":"Ullah","year":"2024","journal-title":"Heliyon"},{"issue":"4","key":"10.1016\/j.procs.2026.01.069_bib31","doi-asserted-by":"crossref","first-page":"4627","DOI":"10.11591\/ijece.v14i4.pp4627-4635","article-title":"\u201cA two-stage approach for aircraft detection with convolutional neural network,\u201d","volume":"14","author":"Toghuj","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"6","key":"10.1016\/j.procs.2026.01.069_bib32","doi-asserted-by":"crossref","first-page":"17093","DOI":"10.1007\/s11042-023-16068-4","article-title":"\u201cMobile money fraud detection using data analysis and visualization techniques,\u201d","volume":"83","author":"Al-Sayyed","year":"2024","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10.1016\/j.procs.2026.01.069_bib33","doi-asserted-by":"crossref","first-page":"6958","DOI":"10.11591\/ijece.v14i6.pp6958-6968","article-title":"\u201cA significant features vector for internet traffic classification based on multi-features selection techniques and ranker, voting filters,\u201d","volume":"14","author":"Munther","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"1","key":"10.1016\/j.procs.2026.01.069_bib34","doi-asserted-by":"crossref","first-page":"299","DOI":"10.22266\/ijies2024.0229.28","article-title":"\u201cToward Enhancing Malware Detection Using Practical Swarm Optimization in Honeypot,\u201d","volume":"17","author":"Othman","year":"2024","journal-title":"International Journal of Intelligent Engineering and Systems"},{"issue":"3","key":"10.1016\/j.procs.2026.01.069_bib35","doi-asserted-by":"crossref","first-page":"732","DOI":"10.22266\/ijies2024.0630.57","article-title":"\u201cAddax Optimization Algorithm: A Novel Nature-Inspired Optimizer for Solving Engineering Applications,\u201d","volume":"17","author":"Hamadneh","year":"2024","journal-title":"International Journal of Intelligent Engineering and Systems"},{"issue":"1","key":"10.1016\/j.procs.2026.01.069_bib36","doi-asserted-by":"crossref","first-page":"100169","DOI":"10.1016\/j.jjimei.2023.100169","article-title":"\u201cSolving the product uncertainty hurdle in social commerce: The mediating role of seller uncertainty,\u201d","volume":"3","author":"Al-Adwan","year":"2023","journal-title":"International Journal of Information Management Data Insights"},{"issue":"4","key":"10.1016\/j.procs.2026.01.069_bib37","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1177\/02666669211054188","article-title":"\u201cDigitally Transforming Electronic Governments into Smart Governments: SMARTGOV, an Extended Maturity Model,\u201d","volume":"39","author":"Hujran","year":"2021","journal-title":"Information Development"},{"issue":"21","key":"10.1016\/j.procs.2026.01.069_bib38","doi-asserted-by":"crossref","first-page":"59887","DOI":"10.1007\/s11042-023-17886-2","article-title":"\u201cModified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System,\u201d","volume":"83","author":"Abualigah","year":"2024","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10.1016\/j.procs.2026.01.069_bib39","doi-asserted-by":"crossref","first-page":"4388","DOI":"10.11591\/eei.v13i6.7608","article-title":"\u201cApplication of smart hydrogels scaffolds for bone tissue engineering,\u201d","volume":"13","author":"Owida","year":"2024","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"issue":"1","key":"10.1016\/j.procs.2026.01.069_bib40","doi-asserted-by":"crossref","first-page":"488","DOI":"10.11591\/ijece.v14i1.pp488-496","article-title":"\u201cAn innovative approach for enhancing capacity utilization in point-to-point voice over internet protocol calls,\u201d","volume":"14","author":"Abualhaj","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"10.1016\/j.procs.2026.01.069_bib41","doi-asserted-by":"crossref","first-page":"64126","DOI":"10.1109\/ACCESS.2024.3390209","article-title":"\u201cPerformance Evaluation of Optical Transmission Based on Link Estimation by Using Deep Learning Techniques,\u201d","volume":"12","author":"Al-Shamayleh","year":"2024","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.procs.2026.01.069_bib42","doi-asserted-by":"crossref","first-page":"257","DOI":"10.3311\/PPtr.23354","article-title":"\u201cThe Feasibility and Operational Performance of Implementation Median U-turn Intersections: A CRITIC Method,\u201d","volume":"52","author":"Alhadidi","year":"2024","journal-title":"Periodica Polytechnica Transportation Engineering"},{"key":"10.1016\/j.procs.2026.01.069_bib43","doi-asserted-by":"crossref","unstructured":"S. Nafaa et al., \u201cAutomated Pavement Cracks Detection and Classification Using Deep Learning,\u201d 2024, IEEE, Minia University,Computers and Systems Department,Minia,Egypt; Arab American University,Civil Engineering Department,Jenin,Palestine; Queensland University of Technology,CARRS-Q,Brisbane,Australia; Al-Ahliyya Amman University,Civil Engineering Department,. doi: 10.1109\/ICMI60790.2024.10586098.","DOI":"10.1109\/ICMI60790.2024.10586098"},{"issue":"5","key":"10.1016\/j.procs.2026.01.069_bib44","doi-asserted-by":"crossref","first-page":"3775","DOI":"10.1007\/s40996-024-01441-6","article-title":"\u201cA Stochastic Approach for Modeling the Saturation Flow Rate at Traffic Signals in Jordan,\u201d","volume":"48","author":"Alomari","year":"2024","journal-title":"Iranian Journal of Science and Technology - Transactions of Civil Engineering"},{"issue":"7","key":"10.1016\/j.procs.2026.01.069_bib45","doi-asserted-by":"crossref","first-page":"2550","DOI":"10.1007\/s40435-023-01381-5","article-title":"\u201cAchieving improved stability for automatic voltage regulation with fractional-order PID plus double-derivative controller and mountain gazelle optimizer,\u201d","volume":"12","author":"Izci","year":"2024","journal-title":"Int J Dyn Control"},{"key":"10.1016\/j.procs.2026.01.069_bib46","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.aej.2024.02.069","article-title":"\u201cOptimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach,\u201d","volume":"93","author":"Premkumar","year":"2024","journal-title":"Alexandria Engineering Journal"},{"key":"10.1016\/j.procs.2026.01.069_bib47","doi-asserted-by":"crossref","unstructured":"R. Nekhili, S. A. Ziadat, and W. Mensi, \u201cCorrigendum to \u2018Frequency interdependence and portfolio management between gold, oil and sustainability stock markets\u201d [International Economics 176, December 2023, 100461],\u2019\u201d International Economics, vol. 178, 2024, doi: 10.1016\/j.inteco.2023.100477.","DOI":"10.1016\/j.inteco.2023.100476"},{"issue":"2","key":"10.1016\/j.procs.2026.01.069_bib48","doi-asserted-by":"crossref","first-page":"100258","DOI":"10.1016\/j.jjimei.2024.100258","article-title":"\u201cHow could entertainment content marketing affect intention to use the metaverse? Empirical findings,\u201d","volume":"4","author":"Alsoud","year":"2024","journal-title":"International Journal of Information Management Data Insights"},{"issue":"3","key":"10.1016\/j.procs.2026.01.069_bib49","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.5267\/j.uscm.2024.4.005","article-title":"\u201cThe nexus between digital supply chain and sustainability: An empirical study in pharmaceutical companies in Jordan,\u201d","volume":"12","author":"Lemoun","year":"2024","journal-title":"Uncertain Supply Chain Management"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000694?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000694?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:22:31Z","timestamp":1777893751000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":49,"alternative-id":["S1877050926000694"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.069","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Reinforcement-Learned Speech Enhancement Models for Real-Time Adaptive Human-Computer Interaction","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.069","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}