• Tidak ada hasil yang ditemukan

Systematic Literature Review: Some Examples

N/A
N/A
Cavint Girsang

Academic year: 2025

Membagikan "Systematic Literature Review: Some Examples"

Copied!
13
0
0

Teks penuh

(1)

CITATIONS

0

READS

33,178

2 authors, including:

Awatif Alqahtany Umm al-Qura University 3PUBLICATIONS   1CITATION   

SEE PROFILE

All content following this page was uploaded by Awatif Alqahtany on 21 April 2019.

The user has requested enhancement of the downloaded file.

(2)

1

Systematic Literature Review: Some Examples

Prepared by:

Awatif Al-Qahtani and Hayat Al-Ghamdi

April 4, 2019

(3)

2

Table of contents

Title ……… 1

Introduction ………. 3

Systematic Literature Review (SLR) ………. 3

Example for a Systematic Literature Review ………. 4

Scope and objective ………. 5

Comparison of Performance Results ………. 6

Conclusion ………. 11

References ………. 12

(4)

3

1. Introduction

i. Systematic Literature Review (SLR):

Modern world and their expansion each day faster are contributing to increase the scientific productions and researches focuses in productivity, low cost solutions and alternatives to traditional manufactured process. Each time the information available in web services, cloud based systems and servers are needing better processing resources and most efficient architectures to guarantee the better performance of hardware and software. This growing investigations, near to be desperate, generate the requirement to classify, synthetize and utilize all this academic or technical information under standardized and systematic methods of approaching. One accurate strategy to generate ordered studies revisions and specific overview of investigations related in a same way of ideas, is denominated systematic literature review. This is a methodology to create revised information about researches with similar or shared focus. Is not only a superficial revision but a complete and exhaustive review of existing studies them. It need to be an analysis quantitative or qualitative with a clear purpose, a protocol or preview steps defined to follow and a clear mention of the literature chosen for the analysis (Okoli) .

(5)

4

ii. Example for a Systematic Literature Review:

In references 5 example for paper that use Systematic Literature Review(SlR)

example:( Event-Driven Process Chain for Modeling and Verification of Business Requirements )shows in fig1 .

Fig.1. Overview of systematic literature review (AMJED).

Scientific Repositories

ACM

Taylor and Francis

IEEE

Elsevier

Springer

Selection and Rejection

Criteria

Selection of 73 studies (1998-2017)

Data Extraction

& Classification

Modeling Category 14 Studies Transformation category 13 Studies Verification Category 17 Studies

General Category 20 Studies Semantic Category 5 Studies

Requirement Category 4 Studies

Analysis \ Synthesis for Answers of Research Qustions

Verification Analysis -EPC-to- Epc(6 Studies) - Petri-nets based (8studies) -Other Languages(3Studies)

Transformation Analysis -EPC-to- Epc(4 Studies) -EPC-to-BPML (9 studies)

Modeling Analysis -UML (2 Studies) - Meta_Model (3 Studies) - EPS Itself (9 Studies)

Analysis \ Synthesis for Answers of Research Qustions

Tools Identification Analalysis Existing Tool(14) :

-Modeling (3)

- Modeling + Verification (2) - Transfornation (1)

- Verification (8) Proposed Tools (5):

-Modeling(1)

- Modeling + Verification (1) - Verification (2)

-Integration (1) Additional Tools(6) : -Modeling (4)

- Modeling + Verification (2)

(6)

5

2. Scope and Objective

In this paper will be evaluated like example five articles marked like systematic literature review in relation with high performance computational engineering systems, being hardware or software based. The principal objective will be to identify the methodology of systematic literature reviews, to realize a comparison between the selected sources, and doing a comparison performance analyze.

The purpose form these papers that use (SLR) to facilitates researchers, practitioners and developers to select appropriate tools according to their requirements. The first article is an approach to the architectures for cryptographic algorithms addressed to analyze asymmetric, symmetric and combined algorithm literature and select the resent research to classified hardware implementation of cryptographic algorithms since 2008 to 2017 (Rashid). The second article revise the model based system engineering known like MBSE since an optic focused on functionalities descriptions and classification, which cited more than 100 references (Waseem). The third article is a revision of literature about event chain modeling and requirement verification in process. Which explain the methodology to classify the literature in this topic using a descriptive classification and not temporal selection .(SLR) using to select and analyze 73 research studies published during 1998–

2017 (AMJAD). The next article is the third from same co-author Rashid, which appoint to base modeling trends of embedded systems (Khan). The final article revised is a revision of the same article from Rashid and the other co-authors mentioned. Which talk about toward selection model for embedded system based in modeling. There is evaluated a total of 39 simulation software for embedded modeling systems (Rashid4).

(7)

6

3. Comparison of Performance Results

A model-based approach is usually focusing on the V-shape that develops software life cycles and processes the sets that form the manual language coding. The model base designs re auto-generated from the mode; without the hustle of testing at every step, it is, therefore, interactive to resolve the coding process without any challenges. In the initial stage, the system level simulation performs system integration and a new perspective of the hardware embedded behavior is detected (Rashid, and Anwar, 2015, 155). Once the initial stage is successful, the models can now extend to other departmental sectors for testing and evaluation. These will operate under simulations of algorithms that are under different operating conditions. Model-based designs will always facilitate complete testing to its functionality and identification of defects will be fast; the performance will constrain despite the development of schedules. The sequence specifications are approaches that are systematically used to ensure that there is the completeness of the specified requirements and the systems are correct. These treats the system only by considering the inputs and outputs without understanding its internal structures. From this model-based system, there is the classification tree that erupts from testing the system to access the domain positions in the classes according to different aspects of its functionality. The test obtained from different selections requires a minimum number of logically compatible combinations which satisfies the minimum specifications in its operations.

(8)

7

The model-based approach creates an extreme critical software injection that applies an embedded system traditionally. These represent the system behavior that forms specified, reasonable, inappropriate and invalid behavior brought about by hardware failures. For the system to overcome unexpected challenges, there is interaction with the system integrations that are efficient according to architectural models. In model-based structures, evaluation is purposely performed to provide the correctness and accuracy of the system is maintainable. These are combined by modeling techniques that specify the behavior of the temporal aspects, for situations where the design does not satisfy the standards of correctness; the validation mode is through simulations. Moreover, there are dependencies among model-based systems that need sufficient knowledge about the development of embedded processes; similarly, separate and unique toolsets for embedded system modifications are ever problematic.

The more advantageous scenarios of this study are that the model-based system gives the user a user guide that provides a step by step procedures that will lead the incumbent to the final stages without facing any technological difficulties. The model would answer questions of whether the model utilizes the support of embedded systems adequately or which system frequently uses embedded systems requirements? Which model to text or model to the model system is used, and also answer the question relating to the significance of the tool in model transformation and simulation activities (Rashid, and Anwar, 2016, 5). Answers to these questions give a view of a protocol that incorporates the methods used in the selection and rejection criteria platform. The review contains the scientific database responsible for search processes to initiate and extraction process which perform the comprehensive system synthesis and analysis.

(9)

8

The characteristic based mode of evaluation preliminary uses the model-based system embedded tool to provide solutions to the system queries and limitations that affect the system.

Table 1. Comparison of results

N0 Article Author subject Year range Number of

sources evaluated

Conclusion Selected sources

1 Event-Driven Process Chain for Modeling

Rashid et al

Modelling of chain process

1998-2017 73 69 sources classified

2 Identification of Trends for Model Based Development of Embedded Systems.

Rashid et al

Embedded systems

2009-2014 5290 61 sources selected

3 Flexible Architectures for Cryptographic

Rashid et al

Cryptographic systems

2008-2017 3181 51 sources selected

4 Toward the tools selectionin model based system engineering for embedded systems

Rashid et al

Embedded tools simulations

2010-2014 61 28 paper selected finally

5 A Systematic Investigation of Tools in Model Base

Rashid et al

2004-2014 5290 61 paper selected

On the other hand, the model provides situations that compel users to external programs, modeling system requirements are the significant MBSE activity that correctly develops the embedded system.

(10)

9

The model transforms, validate and verifies the activities through aspects of profile integration providing a flexible, diverse model, however, certain challenges should go through a specific constraint of temporal timings and frequent use of parametric activities together with block definitions.

Embedded system transformation will frequently compare m2T models and the transformation errors to monitor the efficiency of the system. For his case, there are customized transformation requirements that need simultaneous simulations to handle complex transformation tasks in cases of large embedded systems.

Fig 2. Comparison of sources selected and chosen

0 1000 2000 3000 4000 5000 6000

1 2 3 4 5

Result

Sources evaluated Selected sources Refused sources conclusion

(11)

10

The results of the model-based embedded system support the methodologies across iterations and model processing techniques that visualize the literature review process and execution of publications where system model synthesis is under repeated review. The model-based systems are specific to the impact of quality and outcome. Evaluation bias constrains the digital database management leading to shortages in data execution and identification of the best approach for adoption. Provision of logical validity of constraints threatens the model validation techniques causing bottlenecks to the embedded system development. Establishing visible artifacts in the models requires an appropriate guideline that impacts time and quality across the system iterations. These functions with combinations of systematic review that forms the basic usability by cooperating snowballing techniques and hybrid approach for better search coverage. The proposed plan focuses on systematic review process model creation that transforms the inclusion criteria, applies the search strings and consequently produces a model report (EPC, 2018, 9029).

However, the tool that realizes any meta-modeling is used to generate the best results to represent publications. The results of embedded systems are due to internal modifications and consistent monitoring that transforms the model-based system. The figure 2 show that article with more sources was the numbers 2 and 5. Both paper were based in same information basically. However the objective a propose of defined a selection very different. While one take 61 references to study the other take 39. That indicate the process of systematic literature review is specific for each topic and is not allowed to use the same information for the final study.

(12)

11

Similar subject maybe using same inlet but output will be always different. After this revision is possible to say that articles analyzed have followed the recommendations for systematic researches reviews. In my opinion these articles from author common develop the better methodology and was a completed systematic review more than others.

(Rashid). Without dude will be important to use the procedures standardized in this methodology of literature revision, and it will contribute to improve the quality of futures investigations.

In general i see these articles readable and use simple word . The arrange for main subjects in serial format also the number that inside table very clear and color for diagram and flowchart clearly but in these articles, no more information and details for some concepts and not write full name for the tool and model that found in papers.

4. Conclusion

In conclusion, the investigation gives the current trends, tools, and approaches that support the implementation and development of model-based system embedded to accomplish the objective of system transformation and performance analysis. The tools that develop the integrated system which transforms a model-based system to a more complex system that initiates, monitors and evaluates system progress with interest in its internal operations and the challenge identifications coupled with possible solutions

(13)

12

5. References

AMJAD, ANAM. «Event-Driven Process Chain for Modeling and.» (2018).

Khan, Aamir M. «Identification of Trends for Model Based Development of Embedded Systems.» (2018).

Okoli, Chitu. «A Guide to Conducting a Systematic Literature Review of.» (2006): 7.

Rashid, Muhammad. «Flexible Architectures for Cryptographic.» (2017).

Rashid4, Muhammad. «Toward the tools selectionin model based system engineering for embedded systems—Asystematicliteraturereview.» (2015).

Waseem, Muhammad. «A Systematic Investigation of Tools in Model Based.» (2016).

View publication stats

Referensi

Dokumen terkait

The study findings indicate that mathematical modeling, discrete mathematics, and computational process theory serve as the cultural basis for leveraging

Channel Method of Investigating Primary Focus Gadgets a b c d Score [14] 2019 Conference Architecture A blockchain design committed to being utilized in a supply chain that involves

849 Table 4 – Selected Article Summary Journal/Conference Name Publication Type Number Of Paper International Journal of Information Management Journal 8 Technological

Conclusion: In this SLR, we summarized and synthesized the existing JSMD studies to identify the previous research practices and also to shed light on future guidelines in the malware

Kata kunci yang paling banyak digunakan dalam publish jurnal poultry feed subject area agricultural and biological sciences ditunjukkan oleh gambar 5 dan setidaknya ada 3 klaster kata

CONCLUSION Based on the results and discussion that have been described above, it can be concluded that learning media is divided into three, namely visual-based media, audio-based

CONCLUSION Based on the results of research using the Systematic Literature Review technique that has been carried out, it can be concluded that the Cooperative Learning model uses 2

On the basis of the research questions, these papers were then evaluated for the quality of the evidence they provided, further analyzed, and grouped into the following thematic groups: