<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Service Self-Contextualization in Cyber-Physical Systems based on Context Modeling and Context Variation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander Smirnov</string-name>
          <email>smir@iias.spb.su</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kurt Sandkuhl</string-name>
          <email>kurt.sandkuhl@uni-rostock.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikolay Shilov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikolay Teslya</string-name>
          <email>teslya@iias.spb.su</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ITMO University</institution>
          ,
          <addr-line>Kronverkskiy pr. 49, 197101 St. Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SPIIRAS</institution>
          ,
          <addr-line>14 Line 39, 199178 St. Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>94</fpage>
      <lpage>105</lpage>
      <abstract>
        <p>Internet-of Things (IoT) and Cyber-Physical Systems (CPS) are considered as the key elements of the next industrial revolution. Operation and configuration of such systems require new approaches for managing the variability at design time and the dynamics at runtime, which is caused by changing application environments. The paper proposes to integrate concepts for variability management with context modelling and self-organization in intelligent systems. Self-contextualization is used to adapt behaviors of multiple services to the current situation and context variants for delimiting the extent of adaptation options. The main contributions are an analysis of variability challenges in IoT/CPS based on an industrial case, the concept of context variants as contribution to manage variability and an initial validation using a case study.</p>
      </abstract>
      <kwd-group>
        <kwd>Cyber-physical systems</kwd>
        <kwd>self-organization</kwd>
        <kwd>self-contextualization</kwd>
        <kwd>context variation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        In many industrial sectors, Internet-of Things (IoT) and Cyber-Physical Systems
(CPS) are considered as the key elements of innovative solutions. CPS are expected to
be essential for higher efficiency and flexibility [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. IoT allows for data collection
and new functions in smart connect products [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Operation and configuration of
such systems require new approaches and techniques for managing the variability at
design time and the dynamics at runtime, which is caused by a multitude of
component types and changing application environments. This paper proposes to
integrate concepts from product line engineering for systematic control of variability
with approaches for self-organization in intelligent systems. More concrete, we
propose to explicitly model the “context” of IoT/CPS solutions, identify variants of
the context and use these context variants for self-contextualization of IoT/CPS
solutions.
      </p>
      <p>
        A central concept of our work is “self-contextualization” which aims at
autonomously adapting behaviors of multiple services to their current operational
context. For this reason, the presented conceptual model enables context-awareness
and context-adaptability of the service. Using on an application case in industrial
production lines, the paper illustrates selected challenges as starting point for our
conceptual contribution on integrating variability management and self-organization.
For this purpose, a certain degree of formality is required in CPS models, which will
also be subject of the paper and based on previous work on a reference model in
selfcontextualizing services [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>The main contributions offered by this paper are an analysis of variability
challenges in IoT/CPS solutions based on an industrial case, the concept of context
variants as contribution to manage variability and an initial validation using a case
study. The remaining part of the paper is structured as follows: Section 2 gives a brief
overview to background for this work including variability management and context
computing. Section 3 introduces the concept of self-organization including context
models and a formalization of context variants. Section 4 illustrates the use of context
variants by considering a case study based on an assembly product line. Finally,
section 5 summarizes the paper and discusses future work.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Background</title>
      <p>This section summarizes the conceptual background for our work with focus on
variability management (2.1) and context computing (2.2).</p>
      <sec id="sec-2-1">
        <title>2.1 Variability Modelling</title>
        <p>Capturing and representing variations in sub-systems, sensors or other elements of
IoT/CPS solutions including the relationships or dependencies to other components is
an essential task in context computing. The area of variability modeling offers
concepts how to deal with variability in complex systems, which might be applicable
for CPS and will be briefly presented in this section.</p>
        <p>
          Variability modeling offers an important contribution to managing the variety of
the variants of systems by capturing and visualizing commonalities and dependencies
between features and between the components providing feature implementations.
Since more many years, systematic management of variants is frequently used in the
area of technical systems and in software product lines [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Feature models are one of
the variability modeling approaches often used in product lines and product families.
The purpose of a feature model is to extract, structure and visualize the commonality
and variability of a set of products. Commonalities are the properties of products that
are shared among all the products in a set, which places these products in the same
category or family. Variability are the elements of the products that differentiate and
show configuration options, variation points and choices that are possible between
variants of the product and aim at satisfying different customer requirements. Feature
diagrams are used to visualize the hierarchy and other properties of a feature model;
they express the relation between features. The exact syntax of feature diagrams is
explained in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>
          Recent work on variability modelling also addresses the field of services and
service line engineering. A method for service line engineering is proposed in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] that
bundles all variations of a Software-as-a-Service (SaaS) application based on a
common core. The authors of [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] work in the same area and use variability models to
derive customization and deployment information for individual SaaS tenants. Unlike
conventional distributed agent-based systems, the resources of CPS interact in both
cyber and physical space. For this reason, the mechanisms developed for agent-based
systems in most cases are not efficient in CPS [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2 Context Computing and Context Modelling</title>
        <p>
          Context-computing plays an important role to enable services adapting to situations
in IoT/CPS solutions [
          <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
          ]. The term “context” has been used and still is subject of
research in various application areas and sectors of computer science. In the most
general meaning, context describes what relates the entity under consideration to the
environment surrounding this entity. What an “entity” is depends on the actual
interpretation of context. In this paper, we use the term context according to Dey, who
defines context as “any information that can be used to characterize the situation of
an entity, where an entity is a person, place, or object that is considered relevant to
the interaction between a user and an application, including the user and the
application themselves.” [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]
        </p>
        <p>
          Context-computing is first introduced in 1994 by [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. They consider the context
as the information about located-object and the changes to object over time. With
increasing mobility of users, increased performance and functionality of mobile
devises and sensors, and increasing amount of information available, context
computing also gains of importance in order to integrate circumstances and situations
of the users, what is often referred to as human related context.
        </p>
        <p>
          Although context-computing is widely used in computer science, there is no
general representation and development procedure for context models. Many authors
of context-based systems describe the way of developing the context model for their
specific application, but do not provide a general view. [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] show examples
for UML-context development in pervasive computing and OWL-based context for
reasoning applications. Mena and colleagues [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] sketch a development process for
context –aware systems and identify invariant characteristics of context as part of
their work. These characteristics are (a) context relates always to some entity, (b) is
used to solve a problem (c) depends on the domain and (d) is a dynamic process. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]
propose a method for context modelling in information systems.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Context Variants for Service Self-Contextualization</title>
      <p>Our approach for increasing flexibility and controlling variability in IoT/CPS
solutions consists of the principle of self-contextualization (section 4.1) and detailed
specification of context variants (section 4.2).</p>
      <sec id="sec-3-1">
        <title>3.1 Self-Contextualization in CPS</title>
        <p>
          From a technical viewpoint CPS tightly integrate physical and IT (cyber) systems
based on interactions between these systems in real time [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. CPS rely on control
infrastructures commonly consisting of several levels with different components, such
as sensors, actuators, computational resources, communication services, etc. The
cyber and physical spaces of CPS are represented by sets of resources. The resources
have some functionality in result of which they provide services. In this work, the
term service is used to describe a software or hardware functionality offered by the
service provider to a service user – in our case resources - by a defined interface and
including constraints and policies for the service usage. With this definition, we are in
line with definitions from the area of service-oriented architectures (see, e.g. [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]).
        </p>
        <p>The services provided by one resource are consumed by other resources. Since the
resources are numerous, mobile, and with a changeable composition, the IoT/CPS
solutions belong to the class of variable systems with dynamic structures. Restriction
to only planned resource interactions in such systems is only a theoretical option, in
practice this basically is just impossible. Resource self-organization is the most
efficient way to organize interactions and communications between the resources
making up IoT/CPS solutions. In order to achieve the dynamics of the self-organizing
system, its components have to be creative, knowledgeable, active, and social. The
resources that are parts of a system permanently change their joint environment what
results in a synergetic collaboration and leads to achieving a certain level of collective
intelligence.</p>
        <p>In order for distributed systems to operate efficiently, they have to be provided
with self-organization mechanisms. In IoT/CPS solutions such mechanisms concern
self-organization the system’s resources. The goal of the resource self-organization is
support of humans in their decisions, activities, solution of the tasks, etc. At that,
humans are the participants of the self-organization process, as well.</p>
        <p>
          The process of self-organization of a network assumes creating and maintaining a
logical network structure on top of a dynamically changing physical network
topology. The autonomous and dynamic structuring of components, context
information and resources is the essential work of self-organization [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. The network
is self-organized in the sense that it autonomously monitors available context in the
network, provides the required context and any other necessary network service
support to the requested services, and self-adapts when context changes.
        </p>
        <p>Due to the nature of CPS, semantics is one of the necessary bases to ensure that
several resources arrive at the same meaning regarding the situation and data /
information / knowledge being communicated. Ontologies provide for a shared and
common understanding of some domain that can be communicated across the
multiple CPS' resources.</p>
        <p>
          The present research inherits the idea of ontology usage for modelling context in
CPSs. According to [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], any information describing an entity’s context falls into one
of five categories for context information: individuality, activity, location, time, and
relations. The individuality category contains properties and attributes describing the
entity itself. The category activity covers all tasks this entity may be involved in. The
context categories location and time provide the spatio-temporal coordinates of the
respective entity. Finally, the relations category represents information about any
possible relation the entity may establish with another entity.
        </p>
        <p>
          The context is purposed to represent only relevant information and knowledge
from the large amount of those. Relevance of information and knowledge is evaluated
on a basis how they are related to a modelling of an ad hoc problem. Resource's
context is described by location, time, resource individuality, and event. Resources
perform some activity according to the roles they fulfil in the current context and
depending on the type of event. On the other hand, the type of activity that a resource
performs defines the type of event. The context is updated depending on the
information from the service’s environment and as a result of its activity. The ability
of a system (service) to describe, use and adapt its behavior to its context is referred to
as self-contextualization [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2 Concept of Context Variants</title>
        <p>
          As explained in section 4.1, self-organization depends on context information. As
the same set of context information potentially can be used for different IoT/CPS
solutions or for different configuration or resource combinations in the same IoT/CPS
solution, we propose the concept of context variant (cf. [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]). Context variant is a
predefined structured sub-set of all potential contexts of a component for defining
constraints in behavior of the component for this sub-set. Parametric knowledge set is
the sub-set of system-related knowledge relevant for a specific context variant.
        </p>
        <p>In order to further specify context variants, this section presents a semi-formal
definition. In this definition we also consider the fact, that variants can be composed
of different alternating, optional or mandatory sub-variants. Decomposing variants in
such a way will ease definition of dependencies between variants.</p>
        <p>A context is a tuple Cxt:={C, CT, PK, PKT, P, PT, CV, VS, type, map, specify},
consisting of
 disjoint sets C, and CT whose elements are called context elements and context
element types, respectively; and a function typeC: C  CT, that assigns a type
cti  CT to each ci  C.
 disjoint sets PK and PKT whose elements are called parametric knowledge
elements and parametric knowledge element types respectively; and a function
typep: PK  PKT, that assigns a type pkti  PKT to an element pki  PK
 for each cti  CT a function map: CT  PKT that defines which parametric
knowledge element type can be specified by which context element type and for
each ci of the type cti a function specify: C  PK which updates the parametric
knowledge element corresponding to the context element
 disjoint sets P, and PT whose elements are called parametric knowledge set
elements and parametric knowledge set element types, respectively, with PT 
PKT and a function typePS: P  PT, that assigns a type pti  PT to each pi  P.
 a set of context variants CV with cvi  CV: cvi  PK  P.</p>
        <p>Furthermore, we define a variability specification as a tuple VS:={CV, R, man,
opt, alt, req, excl}, consisting of
 the variation set CV introduced above and a set R whose elements are called
relations; CV and R are disjoined sets.</p>
        <p>A function man: R  2CV  CV that relates mandatory variants. With man(R) =
(CV1, CV2) we define CV2 as a mandatory sub-variant of CV1.</p>
        <p>A function opt: R  2CV  CV that relates optional variants. With opt(R) = (CV1,
CV2) we define CV2 as an optional sub-variant of CV1.</p>
        <p>A function alt: R  2CV  CV that relates alternative variants. With alt(R) = (CV1,
CV2) we define CV2 as an alternative sub-variant of CV1.</p>
        <p>A function req: R  2CV  CV that relates required features. With req(R) = (CV1,
CV2) we define CV2 as a required variant for CV1.</p>
        <p>A function excl: R  2CV  CV that relates mutual-exclusive features. With excl(R)
= (CV1, CV2) we define CV2 is mutual-exclusive to CV1.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4 Context Variation Usage for Automated Production Line</title>
      <p>
        This section illustrates the usage of the context variation in an Industrie 4.0
environment. Integration of the Internet of Things concepts in the industrial
environment makes it possible to significantly increase the level of automation and
flexibility enabling self-adaptation of the industrial equipment to the changing
situation. In the case study, we consider a production line responsible for assembling
optic devices consisting of a lenses and frames (a detailed description can be found in
[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]). The production line consists of three handling units. Handling unit 1 (Fig. 1,
R1) gets a tray from the storage facility (Fig. 1, Storage Facility) and loads it on the
on a self-controlled carrier (Fig. 1, location S1). There are two types of trays in the
system: trays containing frames and trays containing lenses ([
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]), and R1 handles
them by turns: one carrier is loaded with a tray with frames, and the next one is
loaded with the tray with lenses. The loaded carriers move to the location S2 equipped
with a controller and bar code sensor, where handling unit R2 unloads trays from
carriers and puts them to locations S3 and S4 for trays with lenses and frames
respectively. Then, handling unit R3 performs an assembly through putting lenses into
frames (Fig. 2).
      </p>
      <p>When the assembly is finished, the tray with assembled parts is transferred by R2
back to the carrier, which brings them further along the production line for gluing and
other technological operations up to the final product assembly are done.</p>
      <sec id="sec-4-1">
        <title>Zone 2 R3 S4</title>
      </sec>
      <sec id="sec-4-2">
        <title>Storage Facility R1 S1 R2</title>
      </sec>
      <sec id="sec-4-3">
        <title>Zone 1 S2 S3</title>
        <p>In the test implementation of the described above case study, the interaction
process between handling units R1 and R2 was considered. Below, the description of
the scenario in an algorithmic way is presented:
1) Self-controlled carrier transfers the first tray with lenses to S2.
2) The controller installed at S2 detects (through reading the bar code) the
presence of the carrier with a tray with lenses at location S2.
3) The tray with lenses is handled by R2 from the carrier to the assembly table,
location S3.
4) The next carrier having a tray with frames arrives to S2.
5) The controller of S2 detects the carrier with a tray with frames at location S2.
6) The tray with frames is moved by R2 from the second carrier to the assembly
table, location S4.
7) R3 takes lenses from the tray, moves them to S4 and installs into the frames
one by one.
8) If a complete set of lenses and frames is assembled, the system goes to
step 11.
9) If a lens is missing but the assembly process is not completed, the tray with
lenses is loaded by R2 back to the carrier and transferred to the storage
facility (S1) to get the missing component. After that, the system goes to step
1.
10) If a frame is missing but the assembly process is not completed, the tray with
frames is loaded by R2 back to the carrier and transferred to the storage
facility (S1) to get the missing component. After that, the system goes to step
1.
11) The tray with frames with installed lenses is loaded by R2 to the carrier,
which transfers it to the next assembly stages.
12) The system goes to the initial state.</p>
        <sec id="sec-4-3-1">
          <title>The detailed description can be found in [23].</title>
          <p>The test implementation showed that establishing complex communications and
interactions between production units significantly increases the complexity and
decreases the reliability of the entire system. Introduction of the context variation can
simplify the implementation.</p>
          <p>In accordance with the notation given in sec. 4.2, the context elements related to
the case study can be described as follows (fig. 3):</p>
          <p>Context
+ {location_state: position}
&lt;&lt;enum&gt;&gt;
location
+ location2: S2
+ location3: S3
+ location4: S4
&lt;&lt;enum&gt;&gt;
S2
+ empty carrier
+ carrier with lenses
+ carrier with frames
+ carrier with assemblies
+ carrier with empty tray
+ carrier with lenses (missing lens)
+ carrier with frames (missing frame)
position1</p>
          <p>&lt;&lt;enum&gt;&gt;
position2 S3</p>
          <p>&lt;&lt;enum&gt;&gt;
position3 S4
C = {location}
CT = {enum}
PK = {location2; location3; location4}
PKT = {S2, S3, S4}</p>
          <p>P = {nothing; carrier with lenses; carrier with frames; carrier with assemblies;
carrier with empty tray; carrier with lenses (missing lens); carrier with frames
(missing frame); tray with frames; tray with assemblies; tray with lenses; empty tray}
PT = {S2, S3, S4}
CV = P  PK
R2 and R3 can be formulated as follows (only mandatory variants are considered):
R3 (fig. 4)
location3 = tray with frames (mandatory)
location4 = tray with lenses (mandatory)
Run “insert lenses into frames” program
R2 (fig. 5)
Context variation 1:
location2 = carrier with lenses (mandatory)
location4 = nothing (mandatory)
Run “move tray from S2 to S4” program</p>
        </sec>
        <sec id="sec-4-3-2">
          <title>Context variation 2: location2 = carrier with frames (mandatory) location3 = nothing (mandatory) Run “move tray from S2 to S3” program</title>
        </sec>
        <sec id="sec-4-3-3">
          <title>Context variation 3: location2 = empty carrier (mandatory) location4 = empty tray (mandatory) Run “move tray from S4 to S2” program</title>
        </sec>
        <sec id="sec-4-3-4">
          <title>Context variation 4:</title>
          <p>location2 = empty carrier (mandatory)
location3 = tray with assemblies (mandatory)
Run “move tray from S3 to S2” program</p>
          <p>Such context variations were quite easy to implement. For testing purposes
FESTO1 equipment was used controlled by CPX-FEC device implementing easyIP &amp;
Modbus protocols and HTTP requests.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5 Summary and Future Work</title>
      <p>Using an industrial example from CPS in production, this paper motivated the need
for controlling variability and for the introduction of context variants into
selforganization and self-contextualization of IoT/CPS solutions. Part of the work was to
formalize the concept of context variant. Furthermore, the paper presents industrial
cyber-physical system for two robots interaction in a configuration workstation. The
systems is based on the Industrie 4.0 concept that is a new paradigm of intelligent
manufacturing systems based on Internet of Things, internet services, cyber-physical
systems, and cloud technologies. Robots interact with each other through the smart
space infrastructure, which is developed based on Smart-M3 information sharing
platform. Special software for the robot controllers has been developed that allows to
implement scenarios based on control actions. The control actions are supported by
the developed smart space services for each robot, which interact with each other in
the smart space and control robots in the physical space.
1 Festo AG &amp; Co. KG, http://www.festo.de</p>
      <p>The biggest limitation of our work is that it was implemented and used only in one
prototype scenario, i.e. conceptual and technical feasibility have been shown but
pertinence for real-world production has not been demonstrated yet. Context variant
conceptualization were developed with the intention to serve as basis for
implementing services for use in IoT/CPS solutions. We found it valuable to
conceptualize the overall behavior of CPS.</p>
      <p>Future work will include conceptual and technical activities. From a technical
perspective, experimentation with the use of context variants is one of the planned
activities. From a conceptual point of view, we plan to investigate effect of using
context variants on the engineering process of IoT/CPS solutions. The specification of
variations probably has to be part of the design and specification of the overall CPS,
which also will affect requirement elicitation.</p>
      <p>Acknowledgment. The research was partially supported by the Government of
Russian Federation (grant 08-08), grant of the Russian Foundation for Basic Research
#16-29-04349 and State Research no. 0073-2018-0002.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Serugendo</surname>
            ,
            <given-names>G. D. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gleizes</surname>
            ,
            <given-names>M.-P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karageorgos</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Self-Organisation and Emergence in MAS: An Overview</article-title>
          , Informatica,
          <volume>30</volume>
          ,
          <fpage>45</fpage>
          -
          <lpage>54</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Preuveneers</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berbers</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          : Internet of Things: A
          <string-name>
            <surname>Context-Awareness</surname>
            <given-names>Perspective</given-names>
          </string-name>
          , (eds. Yan,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. T.</given-names>
            ,
            <surname>Ning</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          )
          <article-title>The Internet of Things: From RFID to the NextGeneration Pervasive Networked Systems</article-title>
          . Auerbach Publications, Taylor and Francis Group, New York, USA,
          <fpage>287</fpage>
          -
          <lpage>307</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lai</surname>
            ,
            <given-names>C.-F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zou</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Survey on ContextAwareness in Ubiquitous Media</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          : Understanding and
          <string-name>
            <given-names>Using</given-names>
            <surname>Context</surname>
          </string-name>
          ,
          <source>Personal Ubiquitous Computing</source>
          ,
          <volume>5</volume>
          (
          <issue>1</issue>
          ),
          <fpage>4</fpage>
          -
          <lpage>7</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Thörn</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandkuhl</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Feature Modeling: Managing Variability in Complex Systems</article-title>
          , (eds. Tolk,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. C.</surname>
          </string-name>
          )
          <article-title>Complex systems in knowledge-based environments</article-title>
          .
          <source>Theory, models and applications</source>
          , 168. Springer,
          <fpage>129</fpage>
          -
          <lpage>162</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Walraven</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van Landuyt</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Truyen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Handekyn</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Joosen</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Efficient Customization of Multi-Tenant Software-as-a-Service Applications with Service Lines</article-title>
          .
          <source>Journal of Systems and Software</source>
          ,
          <volume>91</volume>
          ,
          <fpage>48</fpage>
          -
          <lpage>62</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Mietzner</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Metzger</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leymann</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohl</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Variability Modeling to Support Customization and Deployment of Multi-Tenant-Aware Software as a Service Applications</article-title>
          .
          <source>Proceedings of the 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems, IEEE Computer Society</source>
          ,
          <fpage>18</fpage>
          -
          <lpage>25</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sedigh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Semantic</given-names>
            <surname>Agent Framework for Cyber-Physical</surname>
          </string-name>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , (eds. Elçi,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Koné</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            &amp;
            <surname>Orgun</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. A.</surname>
          </string-name>
          )
          <source>Semantic Agent Systems</source>
          , Springer,
          <source>Studies in Computational Intelligence</source>
          ,
          <volume>344</volume>
          ,
          <fpage>189</fpage>
          -
          <lpage>213</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sandkuhl</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>U.</given-names>
            <surname>Borchardt</surname>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>How to identify the relevant elements of “context” in Context-aware</article-title>
          <source>Information Systems? 13th International Conference on Business Informatics Research (BIR</source>
          <year>2014</year>
          ),
          <source>September 22-24</source>
          ,
          <year>2014</year>
          , Lund (Sweden).
          <source>LNBIP</source>
          , Springer Verlag.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10..Mena,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Bellamine-Ben Saoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            and
            <surname>Pavard</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          (
          <year>2007</year>
          ):
          <article-title>Towards a Methodology for Context Sensitive Systems Development</article-title>
          , in Kokinov, B.,
          <string-name>
            <surname>Richardson</surname>
            ,
            <given-names>D.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roth-Berghofer</surname>
            ,
            <given-names>T.R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Vieu</surname>
          </string-name>
          , L. (Eds.),
          <source>Modeling and Using Context, Lecture Notes in Computer Science</source>
          , Vol.
          <volume>4635</volume>
          , Springer Berlin Heidelberg, Berlin, Heidelberg, pp.
          <fpage>56</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <article-title>Ambient Networks Phase 2. Integrated Design for Context, Network and Policy Management, Deliverable D10</article-title>
          .-
          <fpage>D1</fpage>
          ,
          <year>2006</year>
          , Retrieved September 09,
          <year>2014</year>
          from http://www.ambient-networks.org/Files/deliverables/D10-D.1_PU.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Zimmermann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lorenz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oppermann</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <source>An Operational Definition of Context, CONTEXT</source>
          <year>2007</year>
          , LNAI,
          <volume>4635</volume>
          , Springer-Verlag,
          <fpage>558</fpage>
          -
          <lpage>571</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Raz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Juhola</surname>
            ,
            <given-names>A. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serrat-Fernandez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          : Fast and
          <string-name>
            <given-names>Efficient</given-names>
            <surname>Context-Aware</surname>
          </string-name>
          <string-name>
            <surname>Services</surname>
          </string-name>
          , John Willey &amp; Sons, Ltd,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>De Mola</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Quitadamo</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Towards an Agent Model for Future Autonomic Communications</article-title>
          ,
          <source>Proceedings of the 7th WOA 2006 Workshop</source>
          From Objects to Agents, Catania, Italy, Sept.
          <fpage>26</fpage>
          -
          <lpage>27</lpage>
          ,
          <year>2006</year>
          , Retrieved June 18,
          <year>2012</year>
          , from:
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.Deutsche Bank Research http://www.dbresearch.de/PROD/DBR_INTERNET_ENPROD/PROD0000000000333571/Industry+4_0%3A+Upgrading+of+Germany%
          <article-title>E2%80%9 9s+industrial+capabilities+on+the+horizon</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Horvath</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gerritsen</surname>
            ,
            <given-names>B. H. M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Cyber-Physical</surname>
            <given-names>Systems</given-names>
          </string-name>
          : Concepts, Technologies and
          <string-name>
            <given-names>Implementation</given-names>
            <surname>Principles</surname>
          </string-name>
          . Horvath,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Rusak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Albers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Behrendt</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of TMCE</source>
          <year>2012</year>
          ,
          <volume>19</volume>
          -
          <fpage>36</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Smirnov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Sandkuhl</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Shilov</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Telsya</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Context Variation for Service Self-Contextualization in Cyber-Physical Systems</article-title>
          .
          <source>Proc. BIS</source>
          <year>2015</year>
          , LNBIP 208, pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2015</year>
          . Springer. DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -19027-3_
          <fpage>25</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Henricksen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Indulska</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Rakotonirainy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2002</year>
          ):
          <article-title>Modeling con context information in pervasive computing systems;</article-title>
          <source>Pervasive '02: Proceedings of the First International Conference on Pervasive Computing; Pervasive '02: Proceedings of the First International Conference on Pervasive Computing;</source>
          <fpage>167</fpage>
          -
          <lpage>180</lpage>
          ; Springer-Verlag, London, UK
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pung</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>: Ontology based context modeling and reasoning</article-title>
          using owl;
          <fpage>18</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Porter</surname>
            ,
            <given-names>M. E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Heppelmann</surname>
            ,
            <given-names>J. E.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>How smart, connected products are transforming competition</article-title>
          .
          <source>Harvard business review</source>
          ,
          <volume>92</volume>
          (
          <issue>11</issue>
          ),
          <fpage>64</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Smirnov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandkuhl</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shilov</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Telsya</surname>
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Context Variation for Service Selfcontextualization in Cyber-Physical Systems</article-title>
          . In: Abramowicz W. (eds)
          <article-title>Business Information Systems</article-title>
          .
          <source>BIS 2015. Lecture Notes in Business Information Processing</source>
          , vol
          <volume>208</volume>
          . Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Schilit</surname>
            ,
            <given-names>B. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Theimer</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          : Disseminating Active Map Information to Mobile Hosts, Network, IEEE;
          <volume>8</volume>
          (
          <issue>5</issue>
          ),
          <fpage>22</fpage>
          -
          <lpage>32</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Smirnov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levashova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shilov</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandkuhl</surname>
            .
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>: Ontology for cyber-physicalsocial systems self-organisation</article-title>
          .
          <source>Proc. FRUCT-16</source>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>107</lpage>
          , IEEE 2014, ISBN 978-5-
          <fpage>7577</fpage>
          -0489-0.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Kashevnik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslya</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Padun</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kipriyanov</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Arckhipov</surname>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Industrial Cyber-Physical System for Lenses Assembly: Configuration Workstation Scenario</article-title>
          .
          <source>Proceedings of the 17th Conference of the Open Innovations Association FRUCT</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>62</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>OASIS</surname>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>OASIS SOA Reference Model Reference Model for Service Oriented Architecture 1.0. OASIS Standard, 12 October 2006</article-title>
          . Available at: http://docs.oasisopen.org/soa-rm/
          <year>v1</year>
          .0/soa-rm.pdf, accessed
          <year>2018</year>
          -
          <volume>09</volume>
          -03.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>