Showing 21 - 40 results of 40 for search '"computer audition"', query time: 0.16s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26

    CovNet: A Transfer Learning Framework for Automatic COVID-19 Detection From Crowd-Sourced Cough Sounds by Yi Chang, Xin Jing, Zhao Ren, Zhao Ren, Björn W. Schuller, Björn W. Schuller

    Published 2022-01-01
    “…Since the COronaVIrus Disease 2019 (COVID-19) outbreak, developing a digital diagnostic tool to detect COVID-19 from respiratory sounds with computer audition has become an essential topic due to its advantages of being swift, low-cost, and eco-friendly. …”
    Get full text
    Article
  7. 27

    Transforming healthcare through a digital revolution: A review of digital healthcare technologies and solutions by Nithesh Naik, Nithesh Naik, B. M. Zeeshan Hameed, B. M. Zeeshan Hameed, Nilakshman Sooriyaperakasam, Shankeeth Vinayahalingam, Vathsala Patil, Komal Smriti, Janhavi Saxena, Milap Shah, Milap Shah, Sufyan Ibrahim, Sufyan Ibrahim, Anshuman Singh, Hadis Karimi, Karthickeyan Naganathan, Dasharathraj K. Shetty, Bhavan Prasad Rai, Bhavan Prasad Rai, Piotr Chlosta, Bhaskar K. Somani, Bhaskar K. Somani

    Published 2022-08-01
    “…Artificial Intelligence (AI), big data, telemedicine, robotic solutions, Internet of Things (IoT), digital platforms for communication (DC), computer vision, computer audition (CA), digital data management solutions (blockchain), digital imaging are premiering to assist healthcare workers (HCW's) with solutions that include case base surveillance, information dissemination, disinfection, and remote consultations, along with many other such interventions.…”
    Get full text
    Article
  8. 28

    Rekabentuk dan pembangunan sistem pakar pengauditan berkomputer : kajian kes di UTM by Mohamed Sidek, Zailani, Hashim, Masri, Alias, Rose Alinda, Mohamed Arif, Ahmad Suki

    Published 1990
    “…This article is a part one of the project on the design and development of an computer auditing expert system for UTM. Due to the fact that the field of computer auditing is new not only to the society in UTM, but also in Malaysia in general, this article has started off by explaining the concepts involved in computer auditing. …”
    Get full text
    Article
  9. 29

    Audit Process during Projects for Development of New Mobile IT Application by Marius POPA

    Published 2010-01-01
    “…This paper presents characteristics of the computer audit process during software development life cycle focused on specific aspects of the mobile IT applications. …”
    Get full text
    Article
  10. 30

    EDP audit & controls ' : a better realization of EDP audit & control in Malaysia/ by Seminar on EDP Audit & Controls 'a Better Realization of EDP Audit & Control in Malaysia (1992 : Kuala Lumpur)

    Published [199
    “…Keynote address/Y Bhg Tan Sri Ishak Tadin -- A survey of EDP auditing, controls & security in Malaysia/Ros Alinda Alias,Habit Noh Sayid Seman, Zailani Mohamed Sidek -- Information system audit technology : trends and applications/Prof Hart J Will -- Expert system's development in computer auditing : the UTM experience/Zailani Mohamed Sidek, Zuraini Ismail, Tajaludin Sharif -- Current practices in computer auditing in Malaysia - private sector/Ong Ai Lin -- Computer auditing in public sector/Ab Rahman Mohamed -- Boundary controls in computer security/Zainab Abu Bakar, Kalsom Nasir -- Auditing and managing of computer resources/Chin Kim Leong -- Controlling end-user computing/Mohd Hasan Selamat, Mohamed Othman, Abu Talib Othman -- Disaster recovery awareness gaining management committment/Monica Holtforster…”
  11. 31
  12. 32

    Scientific and Technological Development and its Impact on Auditing and Control of Management by Maricela Arias-Madrazo, Rafael Domingos-Sapilinha

    Published 2016-06-01
    “…Therefore, the objective of this research is to analyze the role of information systems in the audit, using the method of analysis-synthesis and logical historical, concluding that it is not only the use of information technology in audit, but the computer audit is feasible and possible to reduce costs, improve quality of information, fraud prevention and social satisfaction.…”
    Get full text
    Article
  13. 33

    Auditoría de seguridad informática siguiendo la metodología OSSTMMv3: caso de estudio by Cristian Bracho-Ortega, Fabián Cuzme-Rodríguez, Carlos Pupiales-Yépez, Luis Suárez-Zambrano, Diego Peluffo-Ordóñez, César Moreira-Zambrano

    Published 2017-11-01
    “…ABSTRACT This article explains the methodology followed in computing auditing in terms of security where OSSTMM version 3 was taken as reference methodology and implemented in GAD-Mira. …”
    Get full text
    Article
  14. 34

    Measure cross-sectoral structural similarities from financial networks by M. Boersma, J. Wolsink, S. Sourabh, L. A. Hoogduin, D. Kandhai

    Published 2023-05-01
    “…Besides the direct applications in computational audit, we expect this approach to be of use at multiple scales, from firms to countries, potentially elucidating structural risks at a broader scale.…”
    Get full text
    Article
  15. 35

    Green Electronic Auditing and Accounting Information Reliability in the Jordanian Social Security Corporation: The Mediating Role of Cloud Computing by Ali Mahmoud Alrabei

    Published 2023-09-01
    “…The researcher used structural equation modeling to investigate the connections between cloud computing, auditing on data processing processes, auditing the inputs, auditing the outputs, prior auditing on inputs, and accounting information reliability. …”
    Get full text
    Article
  16. 36

    Junior scientists spotlight social bonds in seminars for diversity, equity, and inclusion in STEM. by Evan A Boyle, Gabriela Goldberg, Jonathan C Schmok, Jillybeth Burgado, Fabiana Izidro Layng, Hannah A Grunwald, Kylie M Balotin, Michael S Cuoco, Keng-Chi Chang, Gertrude Ecklu-Mensah, Aleena K S Arakaki, Noorsher Ahmed, Ximena Garcia Arceo, Pratibha Jagannatha, Jonathan Pekar, Mallika Iyer, DASL Alliance, Gene W Yeo

    Published 2023-01-01
    “…Our approach to scholar profiles and talk transcripts serves as an example for transmuting hundreds of hours of scholarly discourse into rich datasets that can power computational audits of speaker diversity and illuminate speakers' personal and professional priorities.…”
    Get full text
    Article
  17. 37

    Exploring the Key Risk Factors for Application of Cloud Computing in Auditing by Kuang-Hua Hu, Fu-Hsiang Chen, Wei-Jhou We

    Published 2016-08-01
    “…The dimensions/perspectives of the application of cloud computing audit considerations are huge and cover many criteria/factors. …”
    Get full text
    Article
  18. 38
  19. 39
  20. 40

    Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja by Carlos Jaramillo, Luis Jácome, Ángel Ordóñez, María Gaona, Jorge Carrión, Mario Palma

    Published 2017-11-01
    “…Keywords: Computer asset, computer audit, risk management, securities, ISO/IEC 27002, MAGERIT. …”
    Get full text
    Article