Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dmitry A. Maevsky is active.

Publication


Featured researches published by Dmitry A. Maevsky.


east-west design and test symposium | 2014

The levels of target resources development in computer systems

Julia Drozd; Alexander V. Drozd; Dmitry A. Maevsky; Ludmila N. Shapa

The paper considers the resource development levels characterizing the improvement of computer systems and their components. It stresses that the traditional contradictions in the parameters of resources are eliminated with the level increase. The development levels of computer system hardware and software in the processes of both design universalization and specialization and green technology development are estimated.


software engineering for resilient systems | 2013

A New Approach to Software Reliability

Dmitry A. Maevsky

The paper describes a new approach to the software reliability, which is not based on the probability theory, but on the non-equilibrium process theory. It is assumed that defects in the software arise as a result of incoming and outcoming defect flows. Using obtained relations it is possible to predict the amount of identified and entered into the system defects and simulate the reliability of software systems taking into account the secondary defect. The paper shows that the majority of the existing software reliability models ensue from the dynamics of software systems.


Archive | 2017

Evaluating the RAM Energy Consumption at the Stage of Software Development

Dmitry A. Maevsky; Elena Maevskaya; E. D. Stetsuyk

A method of absolute value estimation of the computer energy consumption in performing the programs is proposed in the chapter. The evaluation is made on the basis of the program source code and can help to choose the most optimal solution from the viewpoint of energy saving at the Software development stage. The method is based on the indication of energy consumption by the computer Random Access Memory (RAM) depending upon how intensive the RAM is used by Software. Selection of RAM due to the fact that it is a necessary equipment, and any computing device cannot function without it. Evaluation of energy consumed by RAM is made in using the two proposed mathematical models. The method for computer’s estimating power consumption based on assembler source code was made on the basis of the proposed models. This allows you to create a green software with the control of “green” degree on all stages of its development.


Archive | 2017

Malicious Software Effect on the Mobile Devices Power Consumption

Dmitry A. Maevsky; Elena Maevskaya; E. D. Stetsuyk; Lyudmila N. Shapa

The computer programs, which provide malefactors with the data concerning the usage of an infected mobile device can be referred to malicious software. As a rule, the information is as follows: device location, keys and passwords entered by a user, SMS and telephone conversations contents, e-mail contents and many other. Malicious software can be secretly input to a mobile device, e.g. with the help of Internet. On inputting such kind of Software adjusts the system data in order to conceal its presence in an infected device. At the same time the malicious software cannot be recognized as a computer virus since it does not include the program codes realizing the virus multiplication and infection of other devices. That is why the popular antivirus software does not react to the presence of the malicious software in a device. Thus, we can say that there exists an issue of detection of malicious software presence in a mobile device. To solve the problem a method of indirect detection of malicious software developed by the authors is described in the Chapter. The method is based on a hypothesis of power consumption increase in a mobile device after its being infected by malicious software. Because malicious software taps such power-consuming functions of a device as usage of GPS, Wi-Fi and mobile Internet. To experimentally verify the assumption represented an appropriate experiment was made. It provides the comparison of the smartphone power consumption level in the case of the normal uninfected condition to the one in the case of inputting a spy malicious program. The experiment demonstrated the correctness of the hypothesis and showed that after the input of malicious software the smartphone power consumption increases. The proposed method is a universal one and can be used for any mobile devices running under the control of any operating systems.


Studies in Sociology of Science | 2014

The Software Reliability Increase Method

Svetlana A. Yaremchuk; Dmitry A. Maevsky

Our investigation purpose is to create the software reliability increase method. The proposed method allows creators to calculate statistic, probabilistic and valuating reliability indices of software components which contain defects. The method’s aim is to take into consideration the statistic components complexity by means of composite metrics. The use of received indices provides for components finding which contain much more defects for refactoring and the first testing process. It contributes to increase identified and corrected defects quantity and improve the software reliability on average about 8%.


intelligent data acquisition and advanced computing systems technology and applications | 2017

Software reliability models and assessment techniques review: Classification issues

Dmitry A. Maevsky; Vyacheslav Kharchenko; Maryna Kolisnyk; Elena Maevskaya

This paper proposes the principle of classifier construction for software reliability models and assessment techniques. The classifier is built using a facet-hierarchical approach and allows systematizing scientific publications in the field of software reliability. The available publications for more than 50 years have been analyzed and classified by use of hierarchy of software reliability attributes. Basing on statistics, number of publications on different classification attributes retrospective analysis of the change of this subject area has been performed.


intelligent data acquisition and advanced computing systems technology and applications | 2017

Internet of Things: Hierarhy of smart systems

Dmitry A. Maevsky; Andriy Bojko; Elena Maevskaya; Oleksandr Vinakov; Lyudmila N. Shapa

This paper is the first attempt to carry out the system analysis of Internet of Things as a global and booming object. The hierarchical IoT division into subsystems has been made. The main function executed by certain subsystem is chosen as a criterion of division. The scale of degrees of risks, which can emerge because of negative factors, arising in each of the subsystems is offered. The scale of degrees of risks allows to assess the own risks and cross risks in IoT subsystems. According to the experts involved in the process of assessment the scale is able to indicate the risks emerging at all IoT hierarchy levels. The authors show that the biggest risks emerge in the highest-level system — the one of Internet of Things as a global and planetary object. The directions of the further research of IoT system risks are formulated.


Reliability: Theory & Applications | 2014

A METHOD OF A PRIORI SOFTWARE RELIABILITY EVALUATION

Dmitry A. Maevsky; Svetlana A. Yaremchuk; Ludmila N. Shapa


Reliability: Theory & Applications | 2013

SOFTWARE RELIABILITY. WHAT IS IT

Dmitry A. Maevsky; Igor A. Ushakov; Ludmila N. Shapa


2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) | 2018

Probabilistic assumptions of software reliability growth models

Dmitry A. Maevsky; Dmitry V. Stetsyuk; Elena Maevskaya; Bogdan V. Stetsyuk

Collaboration


Dive into the Dmitry A. Maevsky's collaboration.

Top Co-Authors

Avatar

Elena Maevskaya

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Ludmila N. Shapa

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Lyudmila N. Shapa

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Dmitry V. Stetsyuk

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

E. D. Stetsuyk

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Svetlana A. Yaremchuk

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Alexander V. Drozd

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Andriy Bojko

Odessa National Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Artem Savieliev

Odessa National Polytechnic University

View shared research outputs
Researchain Logo
Decentralizing Knowledge