<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>RECKOn: a REal-world, Context-aware KnOwledge-based lab</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>(Discussion Paper)</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrizia Agnello</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Silvia Maria Ansaldi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emilia Lenzi</string-name>
          <email>emilia.lenzi@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alessio Mongelluzzo</string-name>
          <email>alessio.mongelluzzo@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Davide Piantella</string-name>
          <email>davide.piantella@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manuel Roveri</string-name>
          <email>manuel.roveri@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabio A. Schreiber</string-name>
          <email>fabio.schreiber@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alessandra Scutti</string-name>
          <email>alessandra.scutti@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mahsa Shekari</string-name>
          <email>mahsa.shekari@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Letizia Tanca</string-name>
          <email>letizia.tanca@polimi.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>INAIL - Dipartimento Innovazioni Tecnologiche</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>The RECKON project focuses on interconnection technologies and context-aware data-analytics techniques to improve safety in workplaces, with the ultimate objective of identifying and preventing dangerous situations before accidents occur. In RECKON, prevention is interpreted through the latest monitoring, diagnostics and prognostics techniques from a safety perspective, allowing to detect and use, even in real time, a large amount of data about the entire operational context. Using sensor networks, we are able to collect information that is used in two ways: (i) when a potentially dangerous situation is detected, the system raises an alarm to prevent an accident, and (ii) whenever an accident or a near-miss (i.e., a potential accident that was narrowly averted) occurs, the related useful information is stored in a case report automatically generated and later used to update the accident-prevention politics. This work briefly describes the operational framework of RECKON, along with its modules and their interaction.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Workplace safety</kwd>
        <kwd>Industry 4</kwd>
        <kwd>0</kwd>
        <kwd>Context-awareness</kwd>
        <kwd>Sensor data</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Accidents at work have been a topic of social and economic debate for a long time now. According
to the data of INAIL (Istituto Nazionale per l’Assicurazione contro gli Infortuni sul Lavoro),
641,638 workplace accidents occurred in 2019, 1089 of them resulting in death [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Although
the interest in the subject is always high, the evolution of the enterprise context, in which
accidents occur, makes it necessary to continuously observe and study these phenomena and to
use constantly updated systems for their prevention.
      </p>
      <p>
        The innovative paradigm introduced by Industry 4.0 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] has brought about structural,
technological, productive and organisational changes in the world of work [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], all based on a high
technological development aimed at increasing the productivity and competitiveness of
companies in the market [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The use of innovative sensors, for example, makes it possible to analyse
large amounts of data extracted directly from the production context. However, while there
has been a very strong interest in the digitalization of the working environment, this has been
almost entirely channelled into the dimension of machines and their interconnections with
the surrounding environment, putting the equally important aspect of human presence in the
background [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Instead, by putting the operator at the center, the introduction of innovative
technological solutions may prove fundamental not only for the company’s performance in
terms of profits and competitiveness, but also to provide support to the operator in terms of
prevention in the field of health and safety at work [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>It is therefore clear that crucial points of the problem are an accurate and up-to-date analysis
and description of the context and how the operator interacts with it, and an eficient use of the
data and information derived from this analysis. This is the purpose of the RECKON system,
designed to support companies in monitoring and preventing accidents in the workplace.</p>
      <p>RECKON exploits the integration of the historical analysis with a conceptualisation and
sensitisation of the working context, making it possible to highlight the correspondence between
a situation that has already been identified as potentially dangerous and the current working
situation. More precisely, the system can be considered as composed of three conceptual parts:
(i) sensitization of the companies under consideration (in the current case study, metallurgical
enterprises); (ii) integrated, context-aware sensor data stream processing and conceptualization
of the context described by those data; (iii) integration of the historical data collected in the
critical-events database with other datasets about accidents (both internal and external to INAIL).
Thanks to the last two tasks, it will be possible to build a knowledge base for the subsequent
analyses useful to improve the context-aware monitoring system.</p>
      <p>Sec. 2 of this paper gives an overview of the system, especially focusing on the information
workflow (modules two and three); Sec. 3, details module two; and finally, Sec. 4, summarizes
the techniques used to perform integration in the third module.</p>
    </sec>
    <sec id="sec-2">
      <title>2. System overview</title>
      <p>As shown by Fig. 1, part of the system operates directly in the company, to minimise the latency
time when a decision is to be made or an alarm is triggered, and another part works, at a higher
level (the RECKON Hub), in the Cloud, to integrate information from diferent companies and
other data sources.</p>
      <p>In fact, the RECKON architecture comprises four levels. In the workplace, we find wearable
devices for workers and sensorized machines, and a localisation and imaging system; these two
levels allow to localize the workers and machines and to signal critical or abnormal situations
via vibration or acoustic signals (Module 1). In the enterprise we also find an edge-computing
system to process data acquired from the second level and to generate alarms that will be
sent (via second level) to the workers’ wearable devices (Module 2). Relevant information
from specific installations of the system in the companies are collected and sent to the central
Hub. At this level, it will be possible to perform wide-range analyses on alert or hazardous
situations,integrate these analyses with external sources of all kinds (Module 3), and visualize
Static data
analysis
Monitoring
system
specification in</p>
      <p>PerLa
Instant alarms</p>
      <p>Live data
collection
(PerLa
contextaware queries)</p>
      <p>Level 4
Level 3
Level 2
Level 1
data and results appropriately.</p>
      <p>
        In all cases, when dealing with context-aware pervasive systems, two main problems arise:
the integration of heterogeneous streams of data coming from distinct data sources and the
problem of specifying the system behaviour at various levels, from the low-level support for
hardware abstraction to the high-level support for data management, as we can see from the
system overview. For this reason, we introduce the PerLa system [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], a middleware for data
management and integration that uses the database abstraction for managing the pervasive
system, allowing a data-centric view of the pervasive network and providing a homogeneous
high-level interface to heterogeneous devices. The query language of PerLa is an SQL-like
language that allows access to all the data collected by the network nodes. At the moment,
PerLa has been implemented as a prototype, and using it in a real system would need proper
engineering. However, being it very clear and expressive, we are using PerLa as a specification
language to define the system behaviour and the application constraints. As shown in Fig. 1,
there are diferent types of PerLa queries: the PerLa High Level Queries (HLQ) can be used
for specifying the tasks for integrating diferent datasets; the PerLa Low Level Queries (LLQ)
are interposed between level 2 and level 3 and trigger the sampling operations for the main
context parameters (e.g., worker’s elevation, worker’s position, etc.) thus allowing correct
identification of context changes; in addition, between the two levels we also find the PerLa
Context-aware Queries, that are context-specific and permit to verify particular conditions
within the operator-machine-environment situation.
2.1. Context-aware information workflow
In Fig. 2 we show the information workflow of RECKON, describing the context-aware behaviour
of the system. Sensor data collection from the field, data processing and integration, and alarm
generation, are all context-aware.
      </p>
      <p>The workflow consists of eight main steps, represented in Fig. 2 and detailed below. Let
us consider the following use case of the system: “A worker W enters a delimited area Y of
the working facility, containing a fixed machinery X. In order to operate X, workers should use
specific Personal Protective Equipment (PPE), currently not worn by W”. We now describe how
this scenario is mapped to each step of the workflow.</p>
      <p>Step 0: Field data collection This step is responsible for collecting data from the field: without
loss of generality, we assume that sensor-specific software can ensure an easy access to sensor
data and measurements, in a structured format. For simplicity, we represented these data as
part of a relational database.</p>
      <p>Step 1: PerLa Continuous Query (LLQ) context monitoring is based on the continuous
execution of a set of Low Level Queries on the set of available data sources. For example, to
monitor the height and location of workers in real time, a continuous query will be required
on all smartwatch devices; or, to update the location of mobile machines, a position parameter
sampling operation will be initiated on all devices installed on the machines. In the use case, if
we want to detect the usage of machine X by worker W, one continuous query could be: “What
is the distance between the worker W and the machine X?” (List. 1).</p>
      <p>Step 2: Context change detection We detect a context change if the result of the continuous
query described in Step 1 (i.e., distance between the worker &amp; machine X) is below the threshold.
Step 3: Critical context activation Updating context parameters may lead to the activation
of contexts identified as critical, for which further checks are necessary. In the use case, the
usage of machinery X requires a verification on the PPE of W.</p>
      <p>Step 4: PerLa Context-aware Query The activation of a critical context determines the
execution of Context-aware Queries, possibly generate alarm signals and finally define which
are the useful data to be collected in a case report. In the use case, a context-specific query
could be: “Did the worker wear all the PPE required for using machine X?” (List. 2).
Step 5: PerLa activates context-based alarms The alarms are triggered when critical
conditions occur for the context under consideration; e.g., the worker is not wearing the PPE, thus an
alarm is triggered and, possibly, some predefined security measures are activated. This closes
the context-aware online phase.</p>
      <p>Step 6: Accident and near-miss report This step is to automatically generate a case report
with the details of the accident or near-miss, based on the Context Dimension Tree model
described in Sec. 3. The report is stored in a database, available at both corporate and hub level,that
grants the privacy of personal and sensitive information. The format of the report will be
structured or semi-structured, to ease subsequent automated analysis (Step 7).</p>
      <p>Step 7: Refinement and improvement of PerLa queries PerLa queries can be modified or
added, leveraging a knowledge base generated from the integration and analysis of sensor data,
reports generated in Step 6, historical datasets of accidents, and external data sources. This
possibility aims at anticipating the detection of dangerous situations, reducing the number
of accidents and near-misses. With reference to the use case, the system could infer that too
many non-authorized workers enter area Y to operate machinery X. This new information
may suggest to anticipate the control of the PPE, to the moment when workers enter area Y,
without waiting for the detection of the use of X. If the PPE is not worn when entering area Y, a
pre-alarm is triggered to remind workers to wear the required equipment.
1 CREATE OUTPUT STREAM MachineryLocation (id_machinery STRING, ts STRING, x FLOAT, y FLOAT, z</p>
      <p>FLOAT) AS:
2 EVERY 30 seconds
3 SELECT id_machinery, ts, x, y, z
4 SAMPLING EVERY 10 seconds
5 EXECUTE IF EXISTS id_machinery, x, y, z</p>
      <sec id="sec-2-1">
        <title>Listing 1: Perla Continous Query (LLQ)</title>
        <p>1 CREATE CONTEXT Worker_FixedMachinetry_RelativePosition
2 ACTIVE IF SmartwatchProfile EXISTS AND MachEquType = "Fixedmachinery" AND RelativePosition_WM &lt;
$mimimum_safe
3 ON ENABLE (Worker_FixedMachinetry_RelativePosition):
4 SELECT SmartwatchProfile, Machinery_UsePermission, Workplace_Access,</p>
        <p>PersonalProtectiveEquipment, ProtectionBarriers, SafetyDevices
5 SAMPLING EVERY 1m
6 SET PARAMETER "warning message" = TRUE
7 ACTIVATE ALARM
8 ON DISABLE:
9 DROP Worker_FixedMachinetry_RelativePosition
10 INSERT RECORD INTO Critical_events_db
11 SET PARAMETER "warning message" = FALSE
12 REFRESH EVERY 5m</p>
      </sec>
      <sec id="sec-2-2">
        <title>Listing 2: PerLa Context-aware Query</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Context modelling and representation</title>
      <p>
        A first step in the design of the RECKON context-aware data integration system is a conceptual
modeling phase, aiming to understand and model context information. Among the
methodologies for designing context-aware systems [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], we use the one based on the Context Dimension
Tree (CDT) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], because it allows to capture the context both at a conceptual and a detail level
and has already been experimented for these purposes [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ]. The CDT captures distinct
situations in which the users of a system can find themselves and interact with the surrounding
environments. The tree’s root  represents the most general context;  is the set of nodes; nodes
are either black Dimension Nodes  or white Concept Nodes  , a.k.a, dimension’s values;
 and  must alternate along the branches. White triangles are shorthands to represent
a collection of  graphically. Also, each  and each leaf  without any children can be
further detailed through Parameters, shown in white squares. The root’s children, a.k.a., top
dimensions, specify the main dimensions of the analysis. Each  should have at least one
 or parameter. Fig. 3 shows the CDT Worker, representing the most relevant dimensions
for determining the accident risk exposure of each single worker in the
“operator-machineenvironment” context in the metallurgic Small and Medium-size Enterprises (SMEs) scenario.
The context is understood both as the physical environment (e.g., the environmental parameters,
the objects with which the worker interacts such as machinery and equipment) and as the set
of characteristics specific to each worker (e.g., the worker’s job profile, age, work experience)
that help determine the most critical situation for each worker. In the CDT Worker, some s
have cardinality greater than one; the cardinality was introduced to better model the context of
the worker who, for example, may interact simultaneously with several machines, or, may wear
several Personal Protective Equipments. Note that the dimensions “WorkingPlace”,
“PersonalData” and “MachineryAndEquipments” generate sub-trees not shown here that are nested in the
CDT Worker. The CDT specification allows us to model all the possible contexts and monitor
them during execution, guiding system actions, data collection and interpretation. Through the
PerLa Context component [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] it is possible to express formally both the context model (CDT
Declaration) and the context-aware system behavior when a critical context occurs (Context
Creation clause). Declaring a context also describes the conditions for its activation (ACTIVE IF
clause) and defines the consequent action(s) of the system. The ACTIVE IF condition is defined
on the context parameters and dimensions by considering some critical thresholds. For example,
the context when: (i) a worker is in the proximity of a mobile machine, (ii) the distance between
the worker and the machine is less than the critical threshold and (iii) the machine is switched
on or moving, is described as: ACTIVE IF MachEqType = ‘MobileMachine’ AND Velocity_M &gt; 0
m/s AND RelativePositition_WM &lt; MnimumSafeDistance. Each of the main accident categories
and dangerous situations derived from the analyses defines one or more such critical contexts,
that can be modified or added as the system gains “experience”, i.e., based on the progressive
analyses of the occurred situations.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Extracting knowledge from textual descriptions</title>
      <p>A further enrichment of the description of work environments and their possible dangers is the
use of ontologies. Since we could not find suficiently rich ontologies for the Italian language, we
developed a new one starting from the CDT terminology and from the analysis of the datasets
at our disposal. The ultimate aim of this ontology is to integrate the context-aware knowledge
with analysis techniques for Natural Language Processing (NLP), a crucial part of Module 3. To
combine the semantic representation with textual data analysis, we divided the ontology into
Grammatical Categories and Semantic Classes. This permits to separate the meaning of each
term from its grammatical role, using these two pieces of information either independently
or in a combined way, depending on the task. Currently, taking into account the methods
used for NLP-based analysis, we have identified four basic Grammatical Categories: Noun, Verb,
Adjective and Adverb. To identify the main Semantic Classes, following a bottom-up approach,
we started from the most frequent terms of the CDT and the data at our disposal and then
generated a hierarchy taking into account their correspondence with the dimensions of the
context tree. To embed ontological classes in the textual analyses, a TAG is created for each
class, and the most frequent terms analyzed are replaced in the datasets with these tags. Here
is an example of hierarchy in the ontology with related TAGs: Object(0) –&gt; Work_Object(WO)
–&gt; Tool (WOT) –&gt; hammer. Regarding the combination of Semantic Classes and Grammatical
Categories, at the moment we are working on the formalisation of rules that follow those of
the Italian grammatical and logical analysis, being careful not to introduce redundancies. For
example, to express the activity “to hammer” we chose to combine the category “Verb” with the
class “Tool” in order to group all the accidents involving tools easily without creating a proper
class “work activity” or “work activity involving tools”.</p>
      <p>
        The third and last module is RECKONition (extensively described in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]), a NLP-based
system for accidens prevention in industry that analyses Italian textual descriptions of previous
accidents to build both unsupervised and supervised models. The architecture of this analysis
system comprises three models: Association Rule Generator, Textual Description Clustering [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] –
highlighting groups of accidents at work sharing similarities in their descriptions–, and Textual
Description Inference, providing next-sentence predictions from the textual description of the
accidents. Experimental results are rather satisfactory.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and future works</title>
      <p>We introduced RECKON, a context-aware pervasive system which combines diferent
technologies to eficiently prevent accidents within metallurgical companies. In particular, we focused
on describing the context of interest and its embedding within heterogeneous integration and
analysis on diferent levels. To verify the eficiency of the proposed models, we conducted a
survey campaign with many manufacturing companies, which resulted in an endorsement of
our proposed framework. The next steps will be the actual installation of the sensors in situ
and the analysis of the sampled data.
This work has been funded by INAIL within the BRiC/2018, ID09 framework, project RECKON.
The authors wish to acknowledge all the other researchers involved in the project: Francesco
Braghin (PoliMI, DMEC), Enrico Cagno (PoliMI, DIG), and their research groups. We also thank
Cinzia Frascheri (IAL) and Irene Tagliaro (API-TECH).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>INAIL</surname>
          </string-name>
          ,
          <article-title>Andamento degli infortuni sul lavoro e delle malattie professionali</article-title>
          , https://www. inail.it/cs/internet/docs/alg-dati-inail-2021
          <string-name>
            <surname>-</surname>
          </string-name>
          gennaio-pdf.pdf,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <article-title>Industry 4.0: A survey on technologies, applications</article-title>
          and open research issues,
          <source>J. Ind. Inf. Integr</source>
          .
          <volume>6</volume>
          (
          <issue>2017</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jii.
          <year>2017</year>
          .
          <volume>04</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bagheri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.-A.</given-names>
            <surname>Kao</surname>
          </string-name>
          ,
          <article-title>A cyber-physical systems architecture for industry 4.0-based manufacturing systems</article-title>
          ,
          <source>Manufacturing Letters</source>
          <volume>3</volume>
          (
          <year>2015</year>
          )
          <fpage>18</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Edgar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Porter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bernaden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sarli</surname>
          </string-name>
          ,
          <article-title>Smart manufacturing, manufacturing intelligence and demand-dynamic performance</article-title>
          ,
          <source>Comput. Chem. Eng</source>
          .
          <volume>47</volume>
          (
          <year>2012</year>
          )
          <fpage>145</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Fantini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pinzone</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Taisch, Placing the operator at the centre of industry 4.0 design: Modelling and assessing human activities within cyber-physical systems</article-title>
          ,
          <source>Computers &amp; Industrial Engineering</source>
          <volume>139</volume>
          (
          <year>2020</year>
          )
          <fpage>105058</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Paelke</surname>
          </string-name>
          ,
          <article-title>Augmented reality in the smart factory: Supporting workers in an industry 4.0. environment</article-title>
          ,
          <source>Proc. of the 2014 IEEE ETFA</source>
          (
          <year>2014</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Schreiber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Camplani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fortunato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marelli</surname>
          </string-name>
          , G. Rota,
          <article-title>Perla: A language and middleware architecture for data management and integration in pervasive information systems</article-title>
          ,
          <source>IEEE Trans. Softw. Eng</source>
          .
          <volume>38</volume>
          (
          <year>2011</year>
          )
          <fpage>478</fpage>
          -
          <lpage>496</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bolchini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Curino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Quintarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Schreiber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tanca</surname>
          </string-name>
          ,
          <article-title>A data-oriented survey of context models</article-title>
          ,
          <source>ACM Sigmod Record</source>
          <volume>36</volume>
          (
          <year>2007</year>
          )
          <fpage>19</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bolchini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Curino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Quintarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Schreiber</surname>
          </string-name>
          , L. Tanca,
          <article-title>Context information for knowledge reshaping</article-title>
          ,
          <source>IJWET</source>
          <volume>5</volume>
          (
          <year>2009</year>
          )
          <fpage>88</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Cassani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gianelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Medana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Quintarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tanca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Zaccaria</surname>
          </string-name>
          ,
          <article-title>On the role of context in the design of mobile mashups</article-title>
          ,
          <source>in: RMC</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>108</fpage>
          -
          <lpage>128</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Javadian Sabet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Schreiber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tanca</surname>
          </string-name>
          ,
          <article-title>Towards learning travelers' preferences in a context-aware fashion</article-title>
          ,
          <source>in: Ambient Intelligence - Software and Applications</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          , pp.
          <fpage>203</fpage>
          -
          <lpage>212</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Sabet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Schreiber</surname>
          </string-name>
          , L. Tanca,
          <article-title>Context awareness in the travel companion of the shift2rail initiative</article-title>
          ,
          <source>in: Proc. of the 28th Italian Symposium on Advanced Database Systems</source>
          , volume
          <volume>2646</volume>
          <source>of CEUR Work. Proc.</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>202</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Schreiber</surname>
          </string-name>
          , E. Panigati,
          <article-title>Context-aware self adapting systems: a ground for the cooperation of data, software, and services</article-title>
          ,
          <source>IJNGC</source>
          <volume>8</volume>
          (
          <year>2017</year>
          )
          <fpage>32</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Agnello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Ansaldi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lenzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mongelluzzo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Roveri</surname>
          </string-name>
          ,
          <article-title>Reckonition: a nlp-based system for industrial accidents at work prevention</article-title>
          ,
          <year>2021</year>
          . arXiv:
          <volume>2104</volume>
          .
          <fpage>14150</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>M. J. Zaki</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Meira</surname>
          </string-name>
          , Jr,
          <source>Data Mining and Analysis: Fundamental Concepts and Algorithms</source>
          , Cambridge University Press,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>