4.5 Review

Toward the tools selection in model based system engineering for embedded systems-A systematic literature review

期刊

JOURNAL OF SYSTEMS AND SOFTWARE
卷 106, 期 -, 页码 150-163

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.jss.2015.04.089

关键词

MBSE; Embedded systems; Tools

资金

  1. NSTIP (National Science Technology, Innovative Plan), Saudi Arabia under the Technology Area Information Technology Strategic Priorities
  2. NSTIP (National Science Technology, Innovative Plan), Saudi Arabia under the Track Software Engineering and Innovated Systems
  3. KACST (King Abdulaziz City for Science and Technology)
  4. STU (Science and Technology Unit) Makkah [13-INF761-10]

向作者/读者索取更多资源

Model based system engineering (MBSE) is a systematic approach of modeling which is frequently used to support requirement specification, design, verification and validation activities of system development. However, it is difficult to customize MBSE approach for the development of embedded systems due to their diverse behavioral aspects. Furthermore, appropriate tools selection to perform particular MBSE activities is always challenging. This paper focuses on the identification and classification of recent research practices pertaining to embedded systems development through MBSE approach. Consequently, a comprehensive analysis of various MBSE tools has been presented. Systematic literature review (SLR) has been used to identify 61 research practices published during 2008-2014. The identified researches have been classified into six different categories to analyze various aspects of MBSE approach for embedded systems. Consequently, 39 preliminary tools are identified that have been used in recent researches. Furthermore, classification and evaluation of tools have been presented. This research highlights important trends and approaches of MBSE to support development of embedded systems. A comprehensive investigation of tools in this article facilitates researchers, practitioners and developers to select appropriate tools according to their requirements. (C) 2015 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Psychology, Multidisciplinary

Why women avoid sexting: Mediating role of depression and guilt

Siraj Hussain, Rongting Zhou, Ahmad Nabeel Siddiquei, Muhammad Azfar Anwar, Fahad Asmi

Summary: This study explores the challenging nature of sexting in today's digital world, especially for women. The research finds that social threat is the most significant factor influencing women's intentions to avoid sexting, with depression having twice the impact of guilt. The study suggests that the threat of being scammed should be effectively communicated in society to help women avoid sexting.

CURRENT PSYCHOLOGY (2023)

Article Plant Sciences

Field co-inoculation of Bradyrhizobium sp. and Pseudomonas increases nutrients uptake of Vigna radiata L. from fertilized soil

Ghulam Abbas Shah, Maqsood Sadiq, Zahid Iqbal, Noman Shakoor, Muhammad Shahid, Azhar Mehmood Aulakh, Kamusiime Arthur, Nadeem Khan, Iqbal M. I. Ismail, Muhammad Imtiaz Rashid

Summary: The co-inoculation of Bradyrhizobium sp. and phosphorus-solubilizing bacteria (Pseudomonas sp.) can improve the growth, yield, and nitrogen and phosphorus utilization of mungbean crops from chemical fertilizers in nutrient-deficient soils.

JOURNAL OF PLANT NUTRITION (2023)

Article Engineering, Biomedical

dResU-Net: 3D deep residual U-Net based brain tumor segmentation from multimodal MRI

Rehan Raza, Usama Ijaz Bajwa, Yasar Mehmood, Muhammad Waqas Anwar, M. Hassan Jamal

Summary: This research presents an end-to-end framework for automatic 3D Brain Tumor Segmentation using a hybrid model of deep residual network and U-Net. The proposed model achieved promising results in terms of segmentation performance, with high dice scores for tumor sub-regions. It also demonstrated robustness in a real-world clinical setting when validated on an external cohort.

BIOMEDICAL SIGNAL PROCESSING AND CONTROL (2023)

Article Computer Science, Information Systems

An automated and risk free WHO grading of glioma from MRI images using CNN

Ghulam Gilanie, Usama Ijaz Bajwa, Mustansar Mahmood Waraich, Muhammad Waqas Anwar, Hafeez Ullah

Summary: In this research, a model using Convolutional Neural Networks for glioma grading is proposed. The model is validated using a locally organized dataset and a publicly available benchmarked dataset. Experimental results demonstrate high accuracy and efficiency of the proposed model in glioma grade identification.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Physics, Applied

Fixed points in n-gonal graphical b-metric spaces under contractive conditions

Umar Raza, Muhammad Shoaib Anwar, Hayat Ali, V Puneeth, Muhammad Irfan, Zakir Hussain

Summary: In this paper, a new metric space called n-gonal graphical b-metric space is defined. Some fixed point theorems are proven in this metric space, and suitable examples are given to illustrate the results. These findings contribute to solving nonlinear convex models in machine learning and optimization by formulating them as fixed point schemes. The paper opens up possibilities for researchers to explore the intersection between machine learning and functional analysis in the framework of n-gonal graphical b-metric space.

INTERNATIONAL JOURNAL OF MODERN PHYSICS B (2023)

Article Chemistry, Multidisciplinary

Large Field-Size Elliptic Curve Processor for Area-Constrained Applications

Muhammad Rashid, Omar S. Sonbul, Muhammad Yousuf Irfan Zia, Nadeem Kafi, Mohammed H. Sinky, Muhammad Arif

Summary: This article presents an efficient area-optimized elliptic curve cryptographic processor architecture over GF(2409) and GF(2571) by employing Lopez-Dahab projective point arithmetic operations and a hybrid Karatsuba multiplier. The reuse of multiplier resources reduces overall area requirements. The implementation is performed in Verilog (HDL) and the achieved results are provided on Xilinx Virtex 7 device. The proposed design outperforms existing designs in terms of area utilization, making it the right choice for area-constrained cryptographic applications.

APPLIED SCIENCES-BASEL (2023)

Article Mathematics

Contextual Urdu Lemmatization Using Recurrent Neural Network Models

Rabab Hafeez, Muhammad Waqas Anwar, Muhammad Hasan Jamal, Tayyaba Fatima, Julio Cesar Martinez Espinosa, Luis Alonso Dzul Lopez, Ernesto Bautista Thompson, Imran Ashraf

Summary: Machine translation is a rapidly developing research area in natural language processing that bridges the linguistic gap to enhance human communication. The importance of normalization and morphological analyses in information retrieval for machine translation is highlighted, particularly for resource-scarce languages like Urdu. This paper introduces a lemmatization algorithm based on recurrent neural network models for Urdu, which outperforms existing models.

MATHEMATICS (2023)

Article Business

Drivers of green apparel consumption: Digging a little deeper into green apparel buying intentions

Anushree Tandon, Juthamon Sithipolvanichgul, Fahad Asmi, Muhammad Azfar Anwar, Amandeep Dhir

Summary: We investigated economic, cognitive, and ecological factors, as well as consumers' knowledge about apparel production as a moderator, to understand the antecedents of consumers' green apparel buying intentions. Our empirical analysis using structural equation modeling revealed that affordance, ecological concerns, and ascription of responsibility significantly influenced consumers' cognitive state, which in turn affected their buying intentions.

BUSINESS STRATEGY AND THE ENVIRONMENT (2023)

Article Chemistry, Multidisciplinary

A Crypto Accelerator of Binary Edward Curves for Securing Low-Resource Embedded Devices

Asher Sajid, Omar S. S. Sonbul, Muhammad Rashid, Atif Raza Jafri, Muhammad Arif, Muhammad Yousuf Irfan Zia

Summary: This research proposes a novel binary Edwards curve accelerator designed for resource-constrained embedded systems. The accelerator incorporates the fixed window algorithm, two-stage pipelined architecture, and Montgomery radix-4 multiplier, resulting in significant performance improvements in throughput and resource utilization. Experimental results on various Xilinx FPGAs show impressive throughput/area ratios for GF(2^233), with achieved ratios of 12.2, 19.07, 36.01, and 38.39 for Virtex-4, Virtex-5, Virtex-6, and Virtex-7, respectively. Additionally, the processing time for one-point multiplication on a Virtex-7 platform is 15.87 μs. These findings highlight the effectiveness of the proposed accelerator for improved throughput and optimal resource utilization.

APPLIED SCIENCES-BASEL (2023)

Article Chemistry, Multidisciplinary

An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields

Amer Aljaedi, Muhammad Rashid, Sajjad Shaukat Jamal, Adel R. Alharbi, Mohammed Alotaibi

Summary: This article proposes a flexible hardware accelerator optimized for the computationally intensive part of elliptic curve cryptography. The accelerator employs a digit-parallel multiplier for throughput optimization and uses multiplication and squaring circuit for area optimization. Flexibility is achieved through additional buffers and optimized control signal handling. The results and performance comparison demonstrate the suitability of this design for constrained environments demanding efficient implementations in terms of throughput and area.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Throughput/Area-Efficient Accelerator of Elliptic Curve Point Multiplication over GF(2233) on FPGA

Muhammad Rashid, Omar S. Sonbul, Muhammad Yousuf Irfan Zia, Muhammad Arif, Asher Sajid, Saud S. Alotaibi

Summary: This paper presents a hardware accelerator architecture for elliptic curve point multiplication (ECPM) over GF(2233) that is optimized for throughput and area efficiency. The design reduces clock cycles using a bit-parallel Karatsuba modular multiplier and minimizes hardware resources through a consolidated arithmetic unit and leveraging existing hardware resources for inverses. The results demonstrate that the proposed accelerator is suitable for applications that require optimized ECPM implementations in terms of throughput and area.

ELECTRONICS (2023)

Article Zoology

Seroprevalence of Avian Influenza Viruses in Asymptomatic Backyard Poultry Birds in District Multan, Pakistan

Muhammad Tariq Navid, Mian Muhammad Awais, Muhammad Irfan Anwar, Masood Akhtar

Summary: This study investigated the presence of avian influenza viruses (AIVs) in backyard poultry birds in Multan, Pakistan. Out of the 213 randomly selected birds, 13.61% tested positive for AIVs using ELISA kit. RT-PCR confirmed the presence of H9 gene in 6.9% of the seropositive samples. The study concludes that asymptomatic backyard poultry birds can carry AIVs and act as potential reservoirs for recurrent AI outbreaks. Vaccination of rural poultry birds is recommended to prevent further spread of AIVs.

PAKISTAN JOURNAL OF ZOOLOGY (2023)

Article Veterinary Sciences

Effects of Co-Supplementation of β-Galacto-Oligosaccharides and Methionine on Breast Meat Quality, Meat Oxidative Stability and Selected Meat Quality Genes in Broilers

Sohrab Ahmad, Muhammad Shahbaz Yousaf, Sajid Khan Tahir, Muhammad Afzal Rashid, Khalid Abdul Majeed, Mahrukh Naseem, Mohsin Raza, Zafar Hayat, Abia Khalid, Hafsa Zaneb, Habib Rehman

Summary: This study investigated the effects of co-supplementation of beta-GOS and methionine on meat quality traits and muscle formation and degradation pathways in broilers. The results showed that beta-GOS supplementation reduced pH change rate, cooking loss, and muscle fiber diameter, while increasing muscle catalase level and fiber density. Methionine had regulatory effects on gene expression, downregulating MAFbx and MuRF1 genes and upregulating MyoD and M-CK genes.

PAKISTAN VETERINARY JOURNAL (2023)

Article Chemistry, Multidisciplinary

Stratified Bioconvective Jet Flow of Williamson Nanofluid in Porous Medium in the Presence of Arrhenius Activation Energy

V Puneeth, S. Manjunatha, M. Shoaib Anwar, Mowffaq Oreijah, Kamel Geudri, Omar T. Bafakeeh, Ahmed M. Galal

Summary: This study analyzes the characteristics of heat and mass transfer of jet flow of nanofluid past a porous stretching sheet in the presence of microorganisms. Numerical results show that the magnetic field controls the velocity profile of the jet flow, and an increase in the Williamson parameter reduces the fluid velocity. Additionally, higher values of the thermophoresis parameter and porosity increase the thermal and concentration profiles of the nanofluid.

JOURNAL OF COMPUTATIONAL BIOPHYSICS AND CHEMISTRY (2023)

Article Computer Science, Information Systems

Lung Cancer Detection Using Modified AlexNet Architecture and Support Vector Machine

Iftikhar Naseer, Tehreem Masood, Sheeraz Akram, Arfan Jaffar, Muhammad Rashid, Muhammad Amjad Iqbal

Summary: This article introduces the dangers and fatality of lung cancer, as well as the importance of pulmonary nodules in lung cancer detection. It proposes an automatic nodule detection method based on modified AlexNet architecture and Support Vector Machine (SVM) algorithm, and verifies its superior performance on the LUNA16 dataset through experimental analysis.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Review Computer Science, Software Engineering

A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar

Summary: This study provides a comprehensive view of the challenges and critical success factors in the design, implementation, and evaluation stages of phishing education, training, and awareness (PETA). The findings highlight the need to address human-centric issues, bridge users' knowledge gaps, and adopt personalized approaches to enhance defense against phishing attacks.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Performability evaluation of NoSQL-based storage systems☆

Carlos Araujo, Meuse Oliveira Jr., Bruno Nogueira, Paulo Maciel, Eduardo Tavares

Summary: This paper proposes a method based on stochastic Petri nets for evaluating the consistency levels of storage systems based on NoSQL DBMS. The method takes into account different consistency levels and redundant nodes, and estimates the system's availability, throughput, and the probability of accessing the newest data. Experimental results demonstrate the practical feasibility of this approach.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Review Computer Science, Software Engineering

Monitoring tools for DevOps and microservices: A systematic grey literature review

L. Giamattei, A. Guerriero, R. Pietrantuono, S. Russo, I. Malavolta, T. Islam, M. Dinga, A. Koziolek, S. Singh, M. Armbruster, J. M. Gutierrez-Martinez, S. Caro-Alvaro, D. Rodriguez, S. Weber, J. Henss, E. Fernandez Vogelin, F. Simon Panojo

Summary: This article presents the results of a systematic study on the available monitoring tools for DevOps and microservices. It provides a classification and analysis of these tools, aiming to be a useful reference for researchers and practitioners in this field.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Harmonizing DevOps taxonomies - A grounded theory study

Jessica Diaz, Jorge Perez, Isaque Alves, Fabio Kon, Leonardo Leite, Paulo Meirelles, Carla Rocha

Summary: This paper presents empirical research on the structure of DevOps teams in software-producing organizations to better understand the organizational structure and characteristics of teams adopting DevOps. A theory of DevOps taxonomies is built through analysis, and its consistency with other taxonomies is tested.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Managing the changing understanding of benefits in software initiatives

Sinan Sigurd Tanilkan, Jo Erskine Hannay

Summary: When deciding to develop new software, it is important to have a clear understanding of the intended benefits. However, our research shows that stakeholders' understanding of benefits often fluctuates during the development process, leading to uncertainty. Therefore, we recommend focusing on helping practitioners embrace changes in their understanding of benefits.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Detecting security vulnerabilities with vulnerability nets

Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang

Summary: This paper presents an approach that combines static analysis tools and manual audits to effectively detect various types of security vulnerabilities. By using a special Petri net representation, the proposed method is able to assist in the detection of taint-style vulnerabilities.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Early analysis of requirements using NLP and Petri-nets

Edgar Sarmiento-Calisaya, Julio Cesar Sampaio do Prado Leite

Summary: This research introduces an automated requirements analysis approach that combines natural language processing, Petri-nets, and visualization techniques to improve the quality of scenario-based specifications, identify defects, and anticipate inconsistencies.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Trace matrix optimization for fault localization

Jian Hu

Summary: This paper proposes a two-stage trace matrix optimization method for fault localization, which addresses the challenges of coincidental correctness and data imbalance in the current trace matrix. Through extensive experiments, significant improvements in fault localization effectiveness are demonstrated.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Hierarchical features extraction and data reorganization for code search

Fan Zhang, Manman Peng, Yuanyuan Shen, Qiang Wu

Summary: This study proposes a novel method called HFEDR that utilizes the hierarchical features of Transformer models and reorganizes training data to improve code search performance. Experimental results demonstrate the effectiveness and rationality of the proposed approach.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

EsArCost: Estimating repair costs of software architecture erosion using slice technology

Tong Wang, Bixin Li

Summary: Software architecture erosion has a negative impact on software quality, performance, and evolution cost. This paper proposes an approach called EsArCost to locate the causes of architecture erosion and estimate the repair cost of each erosion problem. Experimental results show that EsArCost can effectively and efficiently estimate repair costs.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

SYNTONY: Potential-aware fuzzing with particle swarm optimization

Xiajing Wang, Rui Ma, Wei Huo, Zheng Zhang, Jinyuan He, Chaonan Zhang, Donghai Tian

Summary: This paper proposes a new potential-aware fuzzing scheme called SYNTONY that measures seed potential using multiple objectives and prioritizes promising seeds to increase the number of unique crashes and coverage. Experimental results show that SYNTONY outperforms other fuzzing tools and has high compatibility and expansibility.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

An Empirical Investigation Into the Influence of Software Communities' Cultural and on

Stefano Lambiase, Gemma Catolino, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Willem-Jan van den Heuvel, Filomena Ferrucci

Summary: This paper contributes to the existing body of knowledge on factors affecting productivity in software development by studying the cultural and geographical dispersion of a development community. The results show that cultural and geographical dispersion significantly impact productivity, suggesting that managers and practitioners should consider these aspects throughout the software development lifecycle.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

The effects of required security on software development effort

Elaine Venson, Bradford Clark, Barry Boehm

Summary: The software industry has been under pressure to adopt security practices and reduce software vulnerabilities. This study quantifies the effort required to develop secure software in increasing levels of rigor and scope and provides validated cost multipliers for practitioners to estimate proper resources for adopting security practices.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Towards an understanding of intra-defect associations: Implications for defect prediction

Yangyang Zhao, Mingyue Jiang, Yibiao Yang, Yuming Zhou, Hanjie Ma, Zuohua Ding

Summary: Previous studies have ignored the potential associations between modules involved in the same defect, and this comprehensive study explores the implications of intra-defect associations for defect prediction. The majority of defects occur across functions, with implicit dependencies between the modules. By considering intra-defect associations and merging modules, the proposed data processing approach significantly improves defect prediction performance.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Learning to empathize with users through design thinking in hybrid mode: Insights from two educational case studies

Meira Levy, Irit Hadar

Summary: This research sheds new light on how students learn and practice hybrid work in educational settings through two educational studies. The findings show the benefits of new educational programs in fostering empathy and innovation among students, while also highlighting the challenges and opportunities in addressing real challenges.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)