scholarly journals Claimed advantages and disadvantages of (dedicated) model transformation languages: a systematic literature review

Author(s):  
Stefan Götz ◽  
Matthias Tichy ◽  
Raffaela Groner
2021 ◽  
Vol 13 (2) ◽  
pp. 737
Author(s):  
Indre Siksnelyte-Butkiene ◽  
Dalia Streimikiene ◽  
Tomas Balezentis ◽  
Virgilijus Skulskis

The European Commission has recently adopted the Renovation Wave Strategy, aiming at the improvement of the energy performance of buildings. The strategy aims to at least double renovation rates in the next ten years and make sure that renovations lead to higher energy and resource efficiency. The choice of appropriate thermal insulation materials is one of the simplest and, at the same time, the most popular strategies that effectively reduce the energy demand of buildings. Today, the spectrum of insulation materials is quite wide, and each material has its own specific characteristics. It is recognized that the selection of materials is one of the most challenging and difficult steps of a building project. This paper aims to give an in-depth view of existing multi-criteria decision-making (MCDM) applications for the selection of insulation materials and to provide major insights in order to simplify the process of methods and criteria selection for future research. A systematic literature review is performed based on the Search, Appraisal, Synthesis and Analysis (SALSA) framework and the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) statement. In order to determine which MCDM method is the most appropriate for different questions, the main advantages and disadvantages of different methods are provided.


Signals ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 771-802
Author(s):  
Sandeep Pirbhulal ◽  
Vasileios Gkioulos ◽  
Sokratis Katsikas

In recent times, security and safety are, at least, conducted in safety-sensitive or critical sectors. Nevertheless, both processes do not commonly analyze the impact of security risks on safety. Several scholars are focused on integrating safety and security risk assessments, using different methodologies and tools in critical infrastructures (CIs). Bayesian networks (BN) and graph theory (GT) have received much attention from academia and industries to incorporate security and safety features for different CI applications. Hence, this study aims to conduct a systematic literature review (SLR) for co-engineering safety and security using BN or GT. In this SLR, the preferred reporting items for systematic reviews and meta-analyses recommendations (PRISMA) are followed. Initially, 2295 records (acquired between 2011 and 2020) were identified for screening purposes. Later on, 240 articles were processed to check eligibility criteria. Overall, this study includes 64 papers, after examining the pre-defined criteria and guidelines. Further, the included studies were compared, regarding the number of required nodes for system development, applied data sources, research outcomes, threat actors, performance verification mechanisms, implementation scenarios, applicability and functionality, application sectors, advantages, and disadvantages for combining safety, and security measures, based on GT and BN. The findings of this SLR suggest that BN and GT are used widely for risk and failure management in several domains. The highly focused sectors include studies of the maritime industry (14%), vehicle transportation (13%), railway (13%), nuclear (6%), chemical industry (6%), gas and pipelines (5%), smart grid (5%), network security (5%), air transportation (3%), public sector (3%), and cyber-physical systems (3%). It is also observed that 80% of the included studies use BN models to incorporate safety and security concerns, whereas 15% and 5% for GT approaches and joint GT and BN methodologies, respectively. Additionally, 31% of identified studies verified that the developed approaches used real-time implementation, whereas simulation or preliminary analysis were presented for the remaining methods. Finally, the main research limitations, concluding remarks and future research directions, are presented


2017 ◽  
Vol 26 (12) ◽  
pp. 1730004 ◽  
Author(s):  
Sonia Afrooz ◽  
Nima Jafari Navimipour

Quantum-dot cellular automata (QCA) has come out as one of the potential computational structures for the emerging nanocomputing systems. It has a large capacity in the development of circuits with high space density and dissipation of low heat and allows faster computers to develop with lower power consumption. The QCA is a new appliance to realize nanolevel digital devices and study and analyze their various parameters. It is also a potential technology for low force and high-density memory plans. Large memory designs in QCA show unique features because of their architectural structure. In QCA-based architectures, memory must be maintained in motion, i.e., the memory state has to be continuously moved through a set of QCA cells. These architectures have different features, such as the number of bits stored in a loop, access type (serial or parallel) and cell arrangement for the memory bank. However, the decisive features of the QCA memory cell design are the number of cells, to put off the use of energy. Although the review and study of the QCA-based memories are very important, there is no complete and systematic literature review about the systematical analyses of the state of the mechanisms in this field. Therefore, there are five main types to provide systematic reviews about the QCA-based memories; including read only memory (ROM), register, flip-flop, content addressable memory (CAM) and random access memory (RAM). Also, it has provided the advantages and disadvantages of the reviewed mechanisms and their important challenges so that some interesting lines for any coming research are provided.


2020 ◽  
Vol 49 (1) ◽  
pp. 144-160
Author(s):  
Lazar Raković

Shadow IT coexists with mandated information systems. Developed and applied by non­IT domain experts, it is as a rule, but not exclusively, used for resolving non­routine issues, for which mandated IS does not have appropriate functions. Shadow IT solutions are not supported or controlled by IT departments. The aim of the paper is to show to which extent shadow IT has been researched, as this area has not yet received the necessary attention from both academia and business. A systematic literature review was conducted in order to find the papers covering the topic of shadow IT. The following electronic databases were searched: Web of Science (Thomson Reuters), Scopus (Elsevier), and AIS Electronic Library (The Association for Information Systems (AIS)).  More than half of the analysed papers are case studies in one or more organizations. The papers were published mostly in scientific conferences and in scientific journals. Based on the literature review, the reasons for shadow IT occurrence, the possibility of its management, as well as its advantages and disadvantages are presented. The most important conclusions and views regarding shadow IT, according to the authors’ opinion, are indicated at the end. The limitation of a systematic literature review is that only papers published in English are analysed. Besides identifying papers covering the shadow IT topics, the reasons for the emergence of shadow IT, the possibilities of its management and its advantages and disadvantages are systematized.


2018 ◽  
Vol 8 (10) ◽  
pp. 1307 ◽  
Author(s):  
John J. Ducuara ◽  
Hugo A. Rozo

This article describes the qualitative research findings with the objective of identifying the strategies implemented in the different educational levels (preschool, primary, high school, and, higher education) in order to develop biliteracy. A systematic literature review was carried out, by means of a search strategy rigorously defined. It aims to describe and evaluate the strategies used. The sample consisted of 122 publications, produced between 2007 and 2017. The results obtained allowed to identify the advances in terms of strategies regarding biliteracy in preschool, primary, high school and university, also it showed that some strategies are used in more than one educational level. Besides, some proposals are mentioned, to modify the institution curriculum. In addition, some advantages and disadvantages are established regarding the implementation of the strategies used to work on biliteracy in the target levels. Based on this, the state of the subject is discussed, and a projection is also generated regarding the needs of the field.


Author(s):  
Dominic A. Neu ◽  
Johannes Lahann ◽  
Peter Fettke

AbstractProcess mining enables the reconstruction and evaluation of business processes based on digital traces in IT systems. An increasingly important technique in this context is process prediction. Given a sequence of events of an ongoing trace, process prediction allows forecasting upcoming events or performance measurements. In recent years, multiple process prediction approaches have been proposed, applying different data processing schemes and prediction algorithms. This study focuses on deep learning algorithms since they seem to outperform their machine learning alternatives consistently. Whilst having a common learning algorithm, they use different data preprocessing techniques, implement a variety of network topologies and focus on various goals such as outcome prediction, time prediction or control-flow prediction. Additionally, the set of log-data, evaluation metrics and baselines used by the authors diverge, making the results hard to compare. This paper attempts to synthesise the advantages and disadvantages of the procedural decisions in these approaches by conducting a systematic literature review.


2021 ◽  
Vol 4 (1) ◽  
pp. 91-112
Author(s):  
Hafiz Gulfam Ahmad ◽  
◽  
Iqra Tahir ◽  
Naveed Naeem Abbas ◽  
◽  
...  

In the past few years, software development has seen rapid growth, and developers have adopted different methods to provide efficient procedures in software development, thus reducing the overall bug counts and time delay. Bidirectional model transformation is one such technique that encompasses the development of the object code in both directions enabling an abstract view of the software to the developer; over the year’s researchers, have been able to produce many approaches in bidirectional model transformations (bx), but the cost and best fir for effective model transformation, in particular, a quantities survey will be designed which will discuss the best possible apron in the bx. The methodology for this survey shall be made through SLR to identify around 20 different approaches proposed for bidirectional model transformation; these studies range from the year 2010 till date and are thus, rendered latest in the respective fields of our survey. The gathered results have been calculated on the specific set of parameters that are cost and time of usage time are the main aspects of these approaches, and that is the predicament that has made us produce a systematic literature review (SLR) on this very topic. Thus, this paper investigates different approaches based on their implementation cost and time delay and discusses their limitations, and the approach is implemented. Those approaches have been selected, which culminate in both of these respective parameters. The main objective of this SLR is to provide an insight into the different approaches and establish a well-balanced approach that can be used in bidirectional model transformation in software development.


Sign in / Sign up

Export Citation Format

Share Document