{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:34:29Z","timestamp":1777952069950,"version":"3.51.4"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.104","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"915-922","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Attention-Based LipNet Architectures for Robust Visual Speech Recognition in Multimodal Interfaces"],"prefix":"10.1016","volume":"275","author":[{"given":"Taher M.","family":"Ghazal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reem","family":"Al Maawali","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Falah Y H","family":"Ahmed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eimad","family":"Abusham","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amjed Abbas","family":"Ahmed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.01.104_bib1","doi-asserted-by":"crossref","unstructured":"E. J. Robert and H. J. Duraisamy, \u201cA review on computational methods based automated sign language recognition system for hearing and speech impaired community,\u201d Concurr Comput, vol. 35, no. 9, Apr. 2023, doi: 10.1002\/cpe.7653.","DOI":"10.1002\/cpe.7653"},{"key":"10.1016\/j.procs.2026.01.104_bib2","doi-asserted-by":"crossref","first-page":"2395","DOI":"10.1109\/TASLP.2023.3282093","article-title":"\u201cA Neural-Network Framework for the Design of Individualised Hearing-Loss Compensation,\u201d","volume":"31","author":"Drakopoulos","year":"2023","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"10.1016\/j.procs.2026.01.104_bib3","unstructured":"C. Ukamaka Betrand, O. Uzoamaka Ekwealor, C. J. Onyema, and A. N. Duru, \u201cSpeech Recognition and Transcription for Hearing Impairments.\u201d"},{"issue":"1","key":"10.1016\/j.procs.2026.01.104_bib4","doi-asserted-by":"crossref","first-page":"245","DOI":"10.21015\/vtcs.v11i1.1491","article-title":"\u201cRobot Assist Sign Language Recognition for Hearing Impaired Persons Using Deep Learning,\u201d","volume":"11","author":"Khan","year":"2023","journal-title":"VAWKUM Transactions on Computer Sciences"},{"issue":"3","key":"10.1016\/j.procs.2026.01.104_bib5","doi-asserted-by":"crossref","first-page":"473","DOI":"10.14569\/IJACSA.2023.0140354","article-title":"\u201cValidating the Usability Evaluation Model for Hearing Impaired Mobile Application,\u201d","volume":"14","author":"Nathan","year":"2023","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.1016\/j.procs.2026.01.104_bib6","doi-asserted-by":"crossref","first-page":"101447","DOI":"10.1016\/j.csl.2022.101447","article-title":"\u201cSelf-conducted speech audiometry using automatic speech recognition: Simulation results for listeners with hearing loss,\u201d","volume":"78","author":"Ooster","year":"2023","journal-title":"Comput Speech Lang"},{"issue":"2","key":"10.1016\/j.procs.2026.01.104_bib7","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1121\/10.0017216","article-title":"\u201cFamiliar and unfamiliar speaker recognition assessment and system emulation for cochlear implant users,\u201d","volume":"153","author":"Mamun","year":"2023","journal-title":"J Acoust Soc Am"},{"issue":"2","key":"10.1016\/j.procs.2026.01.104_bib8","doi-asserted-by":"crossref","first-page":"37","DOI":"10.51983\/ajes-2023.12.2.4132","article-title":"\u201cAdvancements in Indian Sign Language Recognition Systems: Enhancing Communication and Accessibility for the Deaf and Hearing Impaired,\u201d","volume":"12","author":"Hussain","year":"2023","journal-title":"Asian Journal of Electrical Sciences"},{"key":"10.1016\/j.procs.2026.01.104_bib9","first-page":"1841","article-title":"\u201cLanguage learning using Speech to Image retrieval,\u201d in Proceedings of the Annual Conference of the International Speech Communication Association","author":"Merkx","year":"2019","journal-title":"INTERSPEECH, International Speech Communication Association"},{"key":"10.1016\/j.procs.2026.01.104_bib10","unstructured":"L. Schell-Majoor and B. Kollmeier, \u201cMapping aided speech recognition thresholds for model-based hearing aid fitting.\u201d"},{"issue":"3","key":"10.1016\/j.procs.2026.01.104_bib11","first-page":"4079","article-title":"\u201cA hybrid discriminant fuzzy DNN with enhanced modularity bat algorithm for speech recognition,\u201d","volume":"44","author":"Venkata Lakshmi","year":"2023","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"6","key":"10.1016\/j.procs.2026.01.104_bib12","doi-asserted-by":"crossref","first-page":"103383","DOI":"10.1016\/j.asej.2025.103383","article-title":"\u201cA swin transformer-driven framework for gesture recognition to assist hearing impaired people by integrating deep learning with secretary bird optimization algorithm,\u201d","volume":"16","author":"Assiri","year":"2025","journal-title":"Ain Shams Engineering Journal"},{"key":"10.1016\/j.procs.2026.01.104_bib13","doi-asserted-by":"crossref","unstructured":"M. Assiri and M. M. Selim, \u201cArtificial Intelligence-driven Gesture Recognition for Hearing-impaired People Using Reptile Search Algorithm with Deep Learning Model,\u201d Journal of Disability Research, vol. 4, no. 4, 2025, doi: 10.57197\/JDR-2025-0657.","DOI":"10.57197\/JDR-2025-0657"},{"issue":"2","key":"10.1016\/j.procs.2026.01.104_bib14","doi-asserted-by":"crossref","first-page":"2599","DOI":"10.32604\/cmc.2025.062695","article-title":"\u201cALCTS\u2014An Assistive Learning and Communicative Tool for Speech and Hearing Impaired Students,\u201d","volume":"83","author":"Vedu","year":"2025","journal-title":"Computers, Materials & Continua"},{"issue":"9","key":"10.1016\/j.procs.2026.01.104_bib15","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s11760-025-04178-5","article-title":"\u201cLips movement detection and conversion into text using deep learning-based CNN model,\u201d","volume":"19","author":"Awan","year":"2025","journal-title":"Signal Image Video Process"},{"key":"10.1016\/j.procs.2026.01.104_bib16","doi-asserted-by":"crossref","first-page":"107783","DOI":"10.1016\/j.neunet.2025.107783","article-title":"\u201cMsDUNE: A multi-scale masked temporal fusion framework for speaker-independent lipreading via Dirichlet uncertainty estimation,\u201d","volume":"191","author":"Wu","year":"2025","journal-title":"Neural Networks"},{"key":"10.1016\/j.procs.2026.01.104_bib17","article-title":"\u201cGRID Corpus Dataset (For training LipNet).\u201d","volume":"22","year":"2025","journal-title":"Accessed: Sep."},{"issue":"3","key":"10.1016\/j.procs.2026.01.104_bib18","doi-asserted-by":"crossref","first-page":"562","DOI":"10.3390\/jtaer16030034","article-title":"\u201cWhat makes consumers purchase mobile apps: Evidence from Jordan,\u201d","volume":"16","author":"Al-Adwan","year":"2021","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"issue":"3","key":"10.1016\/j.procs.2026.01.104_bib19","doi-asserted-by":"crossref","first-page":"816","DOI":"10.22266\/ijies2024.0630.63","article-title":"\u201cDollmaker Optimization Algorithm: A Novel Human-Inspired Optimizer for Solving Optimization Problems,\u201d","volume":"17","author":"Al omari","year":"2024","journal-title":"International Journal of Intelligent Engineering and Systems"},{"key":"10.1016\/j.procs.2026.01.104_bib20","doi-asserted-by":"crossref","unstructured":"O. M. Horani, A. S. Al-Adwan, W. M. Al-Rahmi, and A. Alkhalifah, \u201cEnabling innovation with big data analytics capabilities: the moderating role of organizational learning culture,\u201d Data Science and Management, Jul. 2025, doi: 10.1016\/j.dsm.2025.06.006.","DOI":"10.1016\/j.dsm.2025.06.006"},{"issue":"1","key":"10.1016\/j.procs.2026.01.104_bib21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJEBR.2020010101","article-title":"\u201cFactors affecting the adoption of e-marketing by decision makers in SMEs: Evidence from Jordan,\u201d","volume":"16","author":"Alrousan","year":"2020","journal-title":"International Journal of e-Business Research"},{"key":"10.1016\/j.procs.2026.01.104_bib22","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/3606068","article-title":"\u201cAn Intelligent Proposed Model for Task Offloading in Fog-Cloud Collaboration Using Logistics Regression,\u201d","author":"Bukhari","year":"2022","journal-title":"Comput Intell Neurosci"},{"key":"10.1016\/j.procs.2026.01.104_bib23","doi-asserted-by":"crossref","DOI":"10.1109\/ICAIC53980.2022.9896971","article-title":"\u201cSecuring Smart Cities Using Blockchain Technology,\u201d in","author":"Ghazal","year":"2022","journal-title":"Proc. 2022 1st Int. Conf. AI Cybersecurity (ICAIC)"},{"key":"10.1016\/j.procs.2026.01.104_bib24","doi-asserted-by":"crossref","DOI":"10.1109\/ICBATS54253.2022.9759065","article-title":"\u201cOptimization Procedure for Intelligent Internet of Things Applications,\u201d in","author":"Ahmed","year":"2022","journal-title":"Proc. 2022 Int. Conf. Bus. Anal. Technol. Secur. (ICBATS)"},{"key":"10.1016\/j.procs.2026.01.104_bib25","doi-asserted-by":"crossref","first-page":"159399","DOI":"10.1109\/ACCESS.2021.3131521","article-title":"\u201cMulti-Dimensional Trust Quantification by Artificial Agents Through Evidential Fuzzy Multi-Criteria Decision Making,\u201d","volume":"9","author":"Lee","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.104_bib26","doi-asserted-by":"crossref","unstructured":"C. Dhasaratha et al., \u201cData privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things,\u201d CAAI Trans Intell Technol, Feb. 2024, doi: 10.1049\/cit2.12287.","DOI":"10.1049\/cit2.12287"},{"issue":"6","key":"10.1016\/j.procs.2026.01.104_bib27","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1108\/OIR-01-2024-0017","article-title":"\u201cThe meta-commerce paradox: exploring consumer non-adoption intentions,\u201d","volume":"48","author":"Al-Adwan","year":"2024","journal-title":"Online Information Review"},{"key":"10.1016\/j.procs.2026.01.104_bib28","first-page":"41829","article-title":"\u201cTransformer-Based Named Entity Recognition in Construction Supply Chain Risk Management in Australia,\u201d in IEEE Access","author":"Shishehgarkhaneh","year":"2024","journal-title":"MONASH University, Department of Civil Engineering, Melbourne, Australia: Institute of Electrical and Electronics Engineers Inc."},{"issue":"6","key":"10.1016\/j.procs.2026.01.104_bib29","doi-asserted-by":"crossref","first-page":"6642","DOI":"10.11591\/ijece.v14i6.pp6642-6655","article-title":"\u201cA comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments,\u201d","volume":"14","author":"Kanaker","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering (IJECE)"},{"issue":"10","key":"10.1016\/j.procs.2026.01.104_bib30","doi-asserted-by":"crossref","first-page":"e31592","DOI":"10.1016\/j.heliyon.2024.e31592","article-title":"\u201cBlockchain-powered grids: Paving the way for a sustainable and efficient future,\u201d","volume":"10","author":"Ullah","year":"2024","journal-title":"Heliyon"},{"issue":"6","key":"10.1016\/j.procs.2026.01.104_bib31","doi-asserted-by":"crossref","first-page":"17093","DOI":"10.1007\/s11042-023-16068-4","article-title":"\u201cMobile money fraud detection using data analysis and visualization techniques,\u201d","volume":"83","author":"Al-Sayyed","year":"2024","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10.1016\/j.procs.2026.01.104_bib32","doi-asserted-by":"crossref","first-page":"6958","DOI":"10.11591\/ijece.v14i6.pp6958-6968","article-title":"\u201cA significant features vector for internet traffic classification based on multi-features selection techniques and ranker, voting filters,\u201d","volume":"14","author":"Munther","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"3","key":"10.1016\/j.procs.2026.01.104_bib33","doi-asserted-by":"crossref","first-page":"732","DOI":"10.22266\/ijies2024.0630.57","article-title":"\u201cAddax Optimization Algorithm: A Novel Nature-Inspired Optimizer for Solving Engineering Applications,\u201d","volume":"17","author":"Hamadneh","year":"2024","journal-title":"International Journal of Intelligent Engineering and Systems"},{"issue":"6","key":"10.1016\/j.procs.2026.01.104_bib34","doi-asserted-by":"crossref","first-page":"364","DOI":"10.32479\/irmm.17604","article-title":"\u201cKey Success Factors in Entrepreneurial Development among Women Micro-Entrepreneurs in Malaysia,\u201d","volume":"14","author":"Tirumalaisamy","year":"2024","journal-title":"International Review of Management and Marketing"},{"issue":"21","key":"10.1016\/j.procs.2026.01.104_bib35","doi-asserted-by":"crossref","first-page":"59887","DOI":"10.1007\/s11042-023-17886-2","article-title":"\u201cModified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System,\u201d","volume":"83","author":"Abualigah","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.procs.2026.01.104_bib36","doi-asserted-by":"crossref","unstructured":"S. S. Alja\u2019Afreh, A. T. Altakhaineh, M. H. Al-Shamaileh, A. M. Matarneh, O. R. Daoud, and M. Al-Khawaldah I, \u201cA Dual-Port, and Single-Element Planar Inverted-F Antenna for Current 4G\/5G Portable Applications,\u201d 2024 21st International Multi-Conference on Systems, Signals and Devices, SSD 2024, pp. 750\u2013754, 2024, doi: 10.1109\/SSD61670.2024.10549617.","DOI":"10.1109\/SSD61670.2024.10549617"},{"key":"10.1016\/j.procs.2026.01.104_bib37","doi-asserted-by":"crossref","first-page":"64126","DOI":"10.1109\/ACCESS.2024.3390209","article-title":"\u201cPerformance Evaluation of Optical Transmission Based on Link Estimation by Using Deep Learning Techniques,\u201d","volume":"12","author":"Al-Shamayleh","year":"2024","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.procs.2026.01.104_bib38","doi-asserted-by":"crossref","first-page":"257","DOI":"10.3311\/PPtr.23354","article-title":"\u201cThe Feasibility and Operational Performance of Implementation Median U-turn Intersections: A CRITIC Method,\u201d","volume":"52","author":"Alhadidi","year":"2024","journal-title":"Periodica Polytechnica Transportation Engineering"},{"key":"10.1016\/j.procs.2026.01.104_bib39","doi-asserted-by":"crossref","unstructured":"S. Nafaa et al., \u201cAutomated Pavement Cracks Detection and Classification Using Deep Learning,\u201d 2024, IEEE, Minia University,Computers and Systems Department,Minia,Egypt; Arab American University,Civil Engineering Department,Jenin,Palestine; Queensland University of Technology,CARRS-Q,Brisbane,Australia; Al-Ahliyya Amman University,Civil Engineering Department,. doi: 10.1109\/ICMI60790.2024.10586098.","DOI":"10.1109\/ICMI60790.2024.10586098"},{"issue":"5","key":"10.1016\/j.procs.2026.01.104_bib40","doi-asserted-by":"crossref","first-page":"3775","DOI":"10.1007\/s40996-024-01441-6","article-title":"\u201cA Stochastic Approach for Modeling the Saturation Flow Rate at Traffic Signals in Jordan,\u201d","volume":"48","author":"Alomari","year":"2024","journal-title":"Iranian Journal of Science and Technology - Transactions of Civil Engineering"},{"issue":"7","key":"10.1016\/j.procs.2026.01.104_bib41","doi-asserted-by":"crossref","first-page":"2550","DOI":"10.1007\/s40435-023-01381-5","article-title":"\u201cAchieving improved stability for automatic voltage regulation with fractional-order PID plus double-derivative controller and mountain gazelle optimizer,\u201d","volume":"12","author":"Izci","year":"2024","journal-title":"Int J Dyn Control"},{"issue":"1","key":"10.1016\/j.procs.2026.01.104_bib42","doi-asserted-by":"crossref","first-page":"4548","DOI":"10.1109\/TCE.2023.3326384","article-title":"\u201cVANET Network Traffic Anomaly Detection Using GRU-Based Deep Learning Model,\u201d","volume":"70","author":"Almahadin","year":"2024","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.procs.2026.01.104_bib43","article-title":"\u201cImproved Black Widow Optimization: An investigation into enhancing cloud task scheduling efficiency,\u201d in","volume":"41","author":"Abu-Hashem","year":"2024","journal-title":"Sustainable Computing: Informatics and Systems"},{"issue":"2","key":"10.1016\/j.procs.2026.01.104_bib44","doi-asserted-by":"crossref","first-page":"100258","DOI":"10.1016\/j.jjimei.2024.100258","article-title":"\u201cHow could entertainment content marketing affect intention to use the metaverse? Empirical findings,\u201d","volume":"4","author":"Alsoud","year":"2024","journal-title":"International Journal of Information Management Data Insights"},{"issue":"3","key":"10.1016\/j.procs.2026.01.104_bib45","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.5267\/j.uscm.2024.4.010","article-title":"\u201cThe impact of supply chain performance on financial performance: Dimensions of the SCOR model,\u201d","volume":"12","author":"Abusalma","year":"2024","journal-title":"Uncertain Supply Chain Management"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926001055?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926001055?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:29:40Z","timestamp":1777894180000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926001055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":45,"alternative-id":["S1877050926001055"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.104","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Attention-Based LipNet Architectures for Robust Visual Speech Recognition in Multimodal Interfaces","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.104","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}