CITATIONS
0
READS
33,178
2 authors, including:
Awatif Alqahtany Umm al-Qura University 3PUBLICATIONS 1CITATION
SEE PROFILE
All content following this page was uploaded by Awatif Alqahtany on 21 April 2019.
The user has requested enhancement of the downloaded file.
1
Systematic Literature Review: Some Examples
Prepared by:
Awatif Al-Qahtani and Hayat Al-Ghamdi
April 4, 2019
2
Table of contents
Title ……… 1
Introduction ………. 3
Systematic Literature Review (SLR) ………. 3
Example for a Systematic Literature Review ………. 4
Scope and objective ………. 5
Comparison of Performance Results ………. 6
Conclusion ………. 11
References ………. 12
3
1. Introduction
i. Systematic Literature Review (SLR):
Modern world and their expansion each day faster are contributing to increase the scientific productions and researches focuses in productivity, low cost solutions and alternatives to traditional manufactured process. Each time the information available in web services, cloud based systems and servers are needing better processing resources and most efficient architectures to guarantee the better performance of hardware and software. This growing investigations, near to be desperate, generate the requirement to classify, synthetize and utilize all this academic or technical information under standardized and systematic methods of approaching. One accurate strategy to generate ordered studies revisions and specific overview of investigations related in a same way of ideas, is denominated systematic literature review. This is a methodology to create revised information about researches with similar or shared focus. Is not only a superficial revision but a complete and exhaustive review of existing studies them. It need to be an analysis quantitative or qualitative with a clear purpose, a protocol or preview steps defined to follow and a clear mention of the literature chosen for the analysis (Okoli) .
4
ii. Example for a Systematic Literature Review:
In references 5 example for paper that use Systematic Literature Review(SlR)
example:( Event-Driven Process Chain for Modeling and Verification of Business Requirements )shows in fig1 .
Fig.1. Overview of systematic literature review (AMJED).
Scientific Repositories
ACM
Taylor and Francis
IEEE
Elsevier
Springer
Selection and Rejection
Criteria
Selection of 73 studies (1998-2017)
Data Extraction
& Classification
Modeling Category 14 Studies Transformation category 13 Studies Verification Category 17 Studies
General Category 20 Studies Semantic Category 5 Studies
Requirement Category 4 Studies
Analysis \ Synthesis for Answers of Research Qustions
Verification Analysis -EPC-to- Epc(6 Studies) - Petri-nets based (8studies) -Other Languages(3Studies)
Transformation Analysis -EPC-to- Epc(4 Studies) -EPC-to-BPML (9 studies)
Modeling Analysis -UML (2 Studies) - Meta_Model (3 Studies) - EPS Itself (9 Studies)
Analysis \ Synthesis for Answers of Research Qustions
Tools Identification Analalysis Existing Tool(14) :
-Modeling (3)
- Modeling + Verification (2) - Transfornation (1)
- Verification (8) Proposed Tools (5):
-Modeling(1)
- Modeling + Verification (1) - Verification (2)
-Integration (1) Additional Tools(6) : -Modeling (4)
- Modeling + Verification (2)
5
2. Scope and Objective
In this paper will be evaluated like example five articles marked like systematic literature review in relation with high performance computational engineering systems, being hardware or software based. The principal objective will be to identify the methodology of systematic literature reviews, to realize a comparison between the selected sources, and doing a comparison performance analyze.
The purpose form these papers that use (SLR) to facilitates researchers, practitioners and developers to select appropriate tools according to their requirements. The first article is an approach to the architectures for cryptographic algorithms addressed to analyze asymmetric, symmetric and combined algorithm literature and select the resent research to classified hardware implementation of cryptographic algorithms since 2008 to 2017 (Rashid). The second article revise the model based system engineering known like MBSE since an optic focused on functionalities descriptions and classification, which cited more than 100 references (Waseem). The third article is a revision of literature about event chain modeling and requirement verification in process. Which explain the methodology to classify the literature in this topic using a descriptive classification and not temporal selection .(SLR) using to select and analyze 73 research studies published during 1998–
2017 (AMJAD). The next article is the third from same co-author Rashid, which appoint to base modeling trends of embedded systems (Khan). The final article revised is a revision of the same article from Rashid and the other co-authors mentioned. Which talk about toward selection model for embedded system based in modeling. There is evaluated a total of 39 simulation software for embedded modeling systems (Rashid4).
6
3. Comparison of Performance Results
A model-based approach is usually focusing on the V-shape that develops software life cycles and processes the sets that form the manual language coding. The model base designs re auto-generated from the mode; without the hustle of testing at every step, it is, therefore, interactive to resolve the coding process without any challenges. In the initial stage, the system level simulation performs system integration and a new perspective of the hardware embedded behavior is detected (Rashid, and Anwar, 2015, 155). Once the initial stage is successful, the models can now extend to other departmental sectors for testing and evaluation. These will operate under simulations of algorithms that are under different operating conditions. Model-based designs will always facilitate complete testing to its functionality and identification of defects will be fast; the performance will constrain despite the development of schedules. The sequence specifications are approaches that are systematically used to ensure that there is the completeness of the specified requirements and the systems are correct. These treats the system only by considering the inputs and outputs without understanding its internal structures. From this model-based system, there is the classification tree that erupts from testing the system to access the domain positions in the classes according to different aspects of its functionality. The test obtained from different selections requires a minimum number of logically compatible combinations which satisfies the minimum specifications in its operations.
7
The model-based approach creates an extreme critical software injection that applies an embedded system traditionally. These represent the system behavior that forms specified, reasonable, inappropriate and invalid behavior brought about by hardware failures. For the system to overcome unexpected challenges, there is interaction with the system integrations that are efficient according to architectural models. In model-based structures, evaluation is purposely performed to provide the correctness and accuracy of the system is maintainable. These are combined by modeling techniques that specify the behavior of the temporal aspects, for situations where the design does not satisfy the standards of correctness; the validation mode is through simulations. Moreover, there are dependencies among model-based systems that need sufficient knowledge about the development of embedded processes; similarly, separate and unique toolsets for embedded system modifications are ever problematic.
The more advantageous scenarios of this study are that the model-based system gives the user a user guide that provides a step by step procedures that will lead the incumbent to the final stages without facing any technological difficulties. The model would answer questions of whether the model utilizes the support of embedded systems adequately or which system frequently uses embedded systems requirements? Which model to text or model to the model system is used, and also answer the question relating to the significance of the tool in model transformation and simulation activities (Rashid, and Anwar, 2016, 5). Answers to these questions give a view of a protocol that incorporates the methods used in the selection and rejection criteria platform. The review contains the scientific database responsible for search processes to initiate and extraction process which perform the comprehensive system synthesis and analysis.
8
The characteristic based mode of evaluation preliminary uses the model-based system embedded tool to provide solutions to the system queries and limitations that affect the system.
Table 1. Comparison of results
N0 Article Author subject Year range Number of
sources evaluated
Conclusion Selected sources
1 Event-Driven Process Chain for Modeling
Rashid et al
Modelling of chain process
1998-2017 73 69 sources classified
2 Identification of Trends for Model Based Development of Embedded Systems.
Rashid et al
Embedded systems
2009-2014 5290 61 sources selected
3 Flexible Architectures for Cryptographic
Rashid et al
Cryptographic systems
2008-2017 3181 51 sources selected
4 Toward the tools selectionin model based system engineering for embedded systems
Rashid et al
Embedded tools simulations
2010-2014 61 28 paper selected finally
5 A Systematic Investigation of Tools in Model Base
Rashid et al
2004-2014 5290 61 paper selected
On the other hand, the model provides situations that compel users to external programs, modeling system requirements are the significant MBSE activity that correctly develops the embedded system.
9
The model transforms, validate and verifies the activities through aspects of profile integration providing a flexible, diverse model, however, certain challenges should go through a specific constraint of temporal timings and frequent use of parametric activities together with block definitions.
Embedded system transformation will frequently compare m2T models and the transformation errors to monitor the efficiency of the system. For his case, there are customized transformation requirements that need simultaneous simulations to handle complex transformation tasks in cases of large embedded systems.
Fig 2. Comparison of sources selected and chosen
0 1000 2000 3000 4000 5000 6000
1 2 3 4 5
Result
Sources evaluated Selected sources Refused sources conclusion
10
The results of the model-based embedded system support the methodologies across iterations and model processing techniques that visualize the literature review process and execution of publications where system model synthesis is under repeated review. The model-based systems are specific to the impact of quality and outcome. Evaluation bias constrains the digital database management leading to shortages in data execution and identification of the best approach for adoption. Provision of logical validity of constraints threatens the model validation techniques causing bottlenecks to the embedded system development. Establishing visible artifacts in the models requires an appropriate guideline that impacts time and quality across the system iterations. These functions with combinations of systematic review that forms the basic usability by cooperating snowballing techniques and hybrid approach for better search coverage. The proposed plan focuses on systematic review process model creation that transforms the inclusion criteria, applies the search strings and consequently produces a model report (EPC, 2018, 9029).
However, the tool that realizes any meta-modeling is used to generate the best results to represent publications. The results of embedded systems are due to internal modifications and consistent monitoring that transforms the model-based system. The figure 2 show that article with more sources was the numbers 2 and 5. Both paper were based in same information basically. However the objective a propose of defined a selection very different. While one take 61 references to study the other take 39. That indicate the process of systematic literature review is specific for each topic and is not allowed to use the same information for the final study.
11
Similar subject maybe using same inlet but output will be always different. After this revision is possible to say that articles analyzed have followed the recommendations for systematic researches reviews. In my opinion these articles from author common develop the better methodology and was a completed systematic review more than others.
(Rashid). Without dude will be important to use the procedures standardized in this methodology of literature revision, and it will contribute to improve the quality of futures investigations.
In general i see these articles readable and use simple word . The arrange for main subjects in serial format also the number that inside table very clear and color for diagram and flowchart clearly but in these articles, no more information and details for some concepts and not write full name for the tool and model that found in papers.
4. Conclusion
In conclusion, the investigation gives the current trends, tools, and approaches that support the implementation and development of model-based system embedded to accomplish the objective of system transformation and performance analysis. The tools that develop the integrated system which transforms a model-based system to a more complex system that initiates, monitors and evaluates system progress with interest in its internal operations and the challenge identifications coupled with possible solutions
12
5. References
AMJAD, ANAM. «Event-Driven Process Chain for Modeling and.» (2018).
Khan, Aamir M. «Identification of Trends for Model Based Development of Embedded Systems.» (2018).
Okoli, Chitu. «A Guide to Conducting a Systematic Literature Review of.» (2006): 7.
Rashid, Muhammad. «Flexible Architectures for Cryptographic.» (2017).
Rashid4, Muhammad. «Toward the tools selectionin model based system engineering for embedded systems—Asystematicliteraturereview.» (2015).
Waseem, Muhammad. «A Systematic Investigation of Tools in Model Based.» (2016).
View publication stats