Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Yury A. Kozlov"'
Autor:
Liudmila V. Bregel, Olesya S. Efremova, Kirill Y. Kostyunin, Natalya Y. Rudenko, Yury A. Kozlov, Vadim V. Albot, Natalya А. Knyzeva, Olga V. Tolmacheva, Svetlana V. Ovanesyan, Alexander O. Barakin, Ki O. Pak, Liudmila V. Belousova, Tatyana S. Korinets, Mikhail M. Kostik
Publikováno v:
Biomedicines, Vol 11, Iss 8, p 2206 (2023)
Background: The causative agent of the new coronavirus infection SARS-CoV-2 has unique properties causing hyperinflammatory syndrome and cytokine storm, as well as widespread endotheliitis and thrombotic microangiopathy, initially detected in the lun
Externí odkaz:
https://doaj.org/article/7bcfe87fbcc9469ab5c703dd124d166f
Autor:
Yury A. Kozlov, Simon S. Poloyan, Andrei A. Marchuk, Alexander P. Rozhanski, Anton A. Byrgazov, Konstantin A. Kovalkov, Vadim M. Kapuller, Artem N. Narkevich, Sergey A. Muravev
Publikováno v:
Russian Journal of Pediatric Surgery, Anesthesia and Intensive Care. 13:63-72
Fluorescent imaging technology with indocyanine green (ICG) is used to improve intraoperative visualization of the anatomical structures of the affected organs and increase the efficiency of laparoscopic or robotic operations. Recently, ICG imaging h
Autor:
Yury E. Kozlov
Publikováno v:
Безопасность информационных технологий, Vol 25, Iss 1, Pp 74-80 (2018)
The market of modern mobile applications has increasingly strict requirements for the authentication system reliability. This article examines an authentication method using a multimodal three-dimensional dynamic signature (MTDS), that can be used bo
Externí odkaz:
https://doaj.org/article/110c7ffb683e4a909d44c802f4ef6829
Autor:
Yury E. Kozlov, Vladimir L. Evseev
Publikováno v:
Безопасность информационных технологий, Vol 24, Iss 4, Pp 44-51 (2017)
Reliable authentication in mobile applications is among the most important information security challenges. Today, we can hardly imagine a person who would not own a mobile device that connects to the Internet. Mobile devices are being used to store
Externí odkaz:
https://doaj.org/article/70edf05d7bf54d639e3cba5b289a7a56
Publikováno v:
Безопасность информационных технологий, Vol 24, Iss 1, Pp 49-55 (2017)
The article considered by the relevance of authentication using the gesture performed by the mobile device. Shown the urgency of the application of the proposed authentication method in mobile applications Presented it place in the classification of
Externí odkaz:
https://doaj.org/article/b424f9c681ab43f287bed3063249ee30
Publikováno v:
Безопасность информационных технологий, Vol 23, Iss 1, Pp 32-36 (2016)
Modern methods of voice authentication in mobile devices.The proposed evaluation of the probability errors of the first and second kind for multi-modal methods of voice authentication. The advantages of multimodal multivariate methods before, when au
Externí odkaz:
https://doaj.org/article/3fc123b12c424dc8a3dff2d7c226793b
Autor:
Steven S. Rothenberg, Yury А. Kozlov
Publikováno v:
Russian Journal of Pediatric Surgery, Anesthesia and Intensive Care. 10:327-338
Esophageal atresia is fundamentally important in pediatric surgery, as its treatment results create an accurate portrait of the standards of surgical care, which is provided by any medical institution. Cameron Haight performed the first successful re
Publikováno v:
Russian Journal of Pediatric Surgery. 22:301-305
The open arterial duct (OAD) means the maintenance of the OAD patency in the postnatal period within 48-72 hours after birth. OAD in preterm infants is of particular importance and often determines their survival. The presence of OAD significantly re
Autor:
Vladimir L. Evseev, Yury E. Kozlov
Publikováno v:
Bezopasnostʹ Informacionnyh Tehnologij, Vol 24, Iss 4, Pp 44-51 (2017)
Reliable authentication in mobile applications is among the most important information security challenges. Today, we can hardly imagine a person who would not own a mobile device that connects to the Internet. Mobile devices are being used to store
Autor:
Yury E. Kozlov, Vladimir L. Evseev
Publikováno v:
Bezopasnostʹ Informacionnyh Tehnologij, Vol 24, Iss 1, Pp 49-55 (2017)
The article considered by the relevance of authentication using the gesture performed by the mobile device. Shown the urgency of the application of the proposed authentication method in mobile applications Presented it place in the classification of