ID

Year

Validation Technique

Description

1

1999

Machine-Aided [63]

In this technique, the multi-graph machine is used for specific purposes.

2

2004

Leave-one-out cross Validation [64]

This application is used to validate loss sensitive data, as well as the mathematical modeling purposes.

3

2015

Multistage Validation

[62]

The purpose of this technique is to be able to simulate various systems.

4

2015

Tracing/Traceability

[62]

This is a logical consistency checking technique that is used to evaluate the logical consistency of the framework/model against the domain model.

5

2015

Face Validity

[62]

This technique was developed to make sure the model or framework is complete, logical, and useful, which is why it is important.

6

2005

Cross-validation

[61]

It is a method for evaluating the accuracy of a model, which does not require any further examples to be examined prior to assessing the precision of the model. It is said to be also applicable to mathematical metamodeling.

7

2021

Comparison with

other models

[49]

By comparing the domain model with the metamodel, its completeness,

accuracy, and correctness could be determined.

8

2006

Bootstrap Approach

[60]

There are several advantages to bootstrapping over simulation in terms of computational efficiency. This software has been developed for the purpose of modeling simulations.

9

2007

Formal Ontology

[65]

This method uses ontological domains as a basis for its operation. During the course, a great deal of emphasis is placed on theories.

10

2007

Subjective Validation

[66]

The purpose of this method is to validate the framework, models, or metamodels of analog circuits.

11

2010

Case Study

[67]

This technique is used to evaluate the processes through which metamodels are derived.