Dmitry A. Maevsky
Odessa National Polytechnic University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dmitry A. Maevsky.
east-west design and test symposium | 2014
Julia Drozd; Alexander V. Drozd; Dmitry A. Maevsky; Ludmila N. Shapa
The paper considers the resource development levels characterizing the improvement of computer systems and their components. It stresses that the traditional contradictions in the parameters of resources are eliminated with the level increase. The development levels of computer system hardware and software in the processes of both design universalization and specialization and green technology development are estimated.
software engineering for resilient systems | 2013
Dmitry A. Maevsky
The paper describes a new approach to the software reliability, which is not based on the probability theory, but on the non-equilibrium process theory. It is assumed that defects in the software arise as a result of incoming and outcoming defect flows. Using obtained relations it is possible to predict the amount of identified and entered into the system defects and simulate the reliability of software systems taking into account the secondary defect. The paper shows that the majority of the existing software reliability models ensue from the dynamics of software systems.
Archive | 2017
Dmitry A. Maevsky; Elena Maevskaya; E. D. Stetsuyk
A method of absolute value estimation of the computer energy consumption in performing the programs is proposed in the chapter. The evaluation is made on the basis of the program source code and can help to choose the most optimal solution from the viewpoint of energy saving at the Software development stage. The method is based on the indication of energy consumption by the computer Random Access Memory (RAM) depending upon how intensive the RAM is used by Software. Selection of RAM due to the fact that it is a necessary equipment, and any computing device cannot function without it. Evaluation of energy consumed by RAM is made in using the two proposed mathematical models. The method for computer’s estimating power consumption based on assembler source code was made on the basis of the proposed models. This allows you to create a green software with the control of “green” degree on all stages of its development.
Archive | 2017
Dmitry A. Maevsky; Elena Maevskaya; E. D. Stetsuyk; Lyudmila N. Shapa
The computer programs, which provide malefactors with the data concerning the usage of an infected mobile device can be referred to malicious software. As a rule, the information is as follows: device location, keys and passwords entered by a user, SMS and telephone conversations contents, e-mail contents and many other. Malicious software can be secretly input to a mobile device, e.g. with the help of Internet. On inputting such kind of Software adjusts the system data in order to conceal its presence in an infected device. At the same time the malicious software cannot be recognized as a computer virus since it does not include the program codes realizing the virus multiplication and infection of other devices. That is why the popular antivirus software does not react to the presence of the malicious software in a device. Thus, we can say that there exists an issue of detection of malicious software presence in a mobile device. To solve the problem a method of indirect detection of malicious software developed by the authors is described in the Chapter. The method is based on a hypothesis of power consumption increase in a mobile device after its being infected by malicious software. Because malicious software taps such power-consuming functions of a device as usage of GPS, Wi-Fi and mobile Internet. To experimentally verify the assumption represented an appropriate experiment was made. It provides the comparison of the smartphone power consumption level in the case of the normal uninfected condition to the one in the case of inputting a spy malicious program. The experiment demonstrated the correctness of the hypothesis and showed that after the input of malicious software the smartphone power consumption increases. The proposed method is a universal one and can be used for any mobile devices running under the control of any operating systems.
Studies in Sociology of Science | 2014
Svetlana A. Yaremchuk; Dmitry A. Maevsky
Our investigation purpose is to create the software reliability increase method. The proposed method allows creators to calculate statistic, probabilistic and valuating reliability indices of software components which contain defects. The method’s aim is to take into consideration the statistic components complexity by means of composite metrics. The use of received indices provides for components finding which contain much more defects for refactoring and the first testing process. It contributes to increase identified and corrected defects quantity and improve the software reliability on average about 8%.
intelligent data acquisition and advanced computing systems technology and applications | 2017
Dmitry A. Maevsky; Vyacheslav Kharchenko; Maryna Kolisnyk; Elena Maevskaya
This paper proposes the principle of classifier construction for software reliability models and assessment techniques. The classifier is built using a facet-hierarchical approach and allows systematizing scientific publications in the field of software reliability. The available publications for more than 50 years have been analyzed and classified by use of hierarchy of software reliability attributes. Basing on statistics, number of publications on different classification attributes retrospective analysis of the change of this subject area has been performed.
intelligent data acquisition and advanced computing systems technology and applications | 2017
Dmitry A. Maevsky; Andriy Bojko; Elena Maevskaya; Oleksandr Vinakov; Lyudmila N. Shapa
This paper is the first attempt to carry out the system analysis of Internet of Things as a global and booming object. The hierarchical IoT division into subsystems has been made. The main function executed by certain subsystem is chosen as a criterion of division. The scale of degrees of risks, which can emerge because of negative factors, arising in each of the subsystems is offered. The scale of degrees of risks allows to assess the own risks and cross risks in IoT subsystems. According to the experts involved in the process of assessment the scale is able to indicate the risks emerging at all IoT hierarchy levels. The authors show that the biggest risks emerge in the highest-level system — the one of Internet of Things as a global and planetary object. The directions of the further research of IoT system risks are formulated.
Reliability: Theory & Applications | 2014
Dmitry A. Maevsky; Svetlana A. Yaremchuk; Ludmila N. Shapa
Reliability: Theory & Applications | 2013
Dmitry A. Maevsky; Igor A. Ushakov; Ludmila N. Shapa
2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) | 2018
Dmitry A. Maevsky; Dmitry V. Stetsyuk; Elena Maevskaya; Bogdan V. Stetsyuk