Iodep: Towards An Iot-Data Analysis and Event Processing Architecture For Business Process Incident Management
Iodep: Towards An Iot-Data Analysis and Event Processing Architecture For Business Process Incident Management
Abstract—IoT is becoming a hot spot area of technological Thus they don’t benefit from the different added values that
innovations and economic development promises for many in- could be created from sensor data for example, and the
dustries and services. This new paradigm shift affects all the useful knowledge that could be extracted from event logs and
enterprise architecture layers from infrastructure to business. historical data from previous executions. Further, BPM works
Business Process Management (BPM) is a field among others that in a reactive way [1] which is not sufficient when facing new
is affected by this new technology. To assist data and events ex-
plosion resulting, among others, from IoT, data analytic processes
radical or incremental changes. Early anticipation is crucial
combined with event processing techniques, examine large data to either avoid the occurrence of the problem or respond
sets to uncover hidden patterns, unknown correlations between to it quickly, with no latency, and in an efficient way. This
collected events, either at a very technical level (incident/anomaly lack of proactivity and predictability is remarkable in three
detection, predictive maintenance) or at business level (customer main steps of the BPM life cycle [2] [3]: the design and
preferences, market trends, revenue opportunities) to provide redesign step, the implementation step, and the execution step.
improved operational efficiency, better customer service and To address this problem, proactive-oriented concepts start to be
competitive advantages over rival organizations. In order to used in the BPM glossary such as proactive business process
capitalize the business value of data and events generated by management [1] [4], process forecasting or future-oriented
IoT sensors, IoT, Data Analytics and BPM need to meet in BPM [3] and context-aware business processes [5]. Therefore,
the middle. In this paper, we propose an end-to-end IoT-BPM
integration architecture (IoDEP: IoT-Data-Event-Process) for a
switching from a reactive to a proactive and adaptable business
proactive business process incident management. A case study is processes becomes mandatory for every organization. With this
presented and the obtained results from our experimentations new digitization of industrial processes, comes also the age
demonstrate the benefit of our approach and allowed us to of assistance, which mean that companies should be focused
confirm the efficiency of our assumptions. on customers, in order to offer a personalized and adaptable
services, and even predict their needs in almost real time. Deal-
Keywords—Business process management; internet of things;
machine learning; complex event processing; data analytics
ing with such a continuous changing environment requires an
intelligent, adaptive and flexible business processes. As a result
of all these new changes, organizations nowadays find that
I. I NTRODUCTION the traditional BPM systems present several limitations [6].
Nowadays, Business Process Management (BPM) is a well- In the literature, different approaches have bean proposed to
established discipline in both academia and industry. It is improve business process by applying diverse techniques and
considered as a powerful solution that helps organisations technologies such as recommended systems [7] [8], Ontologies
adapt to strategic, tactical and operational changes and gain [9], data analysis, data mining and process mining [10] [11],
more visibility and control over their business processes, complex event processing [1] [12], Ubiquitous Computing
so that they can continuously improve and optimise their [13], Internet of things - IoT [14] [15], just to name few.
activities and resources. Organizations use Business Process
Processes are executed within application systems belong-
Management systems as an activity-based workflow manager
ing to the real world, where humans, cooperative computer
that allow them to track the optimized functioning of their
systems and even physical objects are involved. In fact, con-
activities in order to gain in terms of agility, efficiency and
nected objects are becoming progressively more prominent in
performance. This method is mainly based on the concept
the business process execution environment. IoT represents the
of business processes. A business process is the structure of
inter-networking of physical objects [16] (also referred to as
activities and actions as they occur in the real world. It defines
”things”, ”connected devices”, ”smart devices”, ”ubiquitous
all the possible paths in the real process and the rules that
devices”), vehicles and other items embedded with sensors,
determine the path to follow and the actions to perform.
electronics, actuators, and network connectivity that enable
In most cases, business processes are isolated either from these ”things” to collect and exchange data when interacting
each other or from the organization’s external ecosystem. and sensing their environment. At the execution level, Busi-
www.ijacsa.thesai.org 900 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
ness processes can be classified into Person-to-Person (P2P), and evaluate our results. And finally, we conclude our paper
Person-to-Application (P2A), and Application-to-Application and present some future perspectives in Section 9.
(A2A) processes [2]. Recently with the emergence of these
IoT devices, new Business process interactions are emerging II. C ONTEXT AND M OTIVATING S CENARIO
such as Person-to-Thing, Thing-to-person, and Thing-to-Thing
due to the advent of Internet of things (IoT) technologies [17]. In this section, we present a real-life scenario to illustrate
However, IoT-BPM integration is still at its infant age. Most our problematic and highlight the challenges we are trying to
of the current research work on BPM-IoT integration, propose solve with the proposed approach.
new approaches that target a specific aspect of the BPM The case study of our research work belongs to silver
life-cycle. For example, updating business process models economy domain, which is a new industrial sector officially
by enriching business process model and notation (BPMN) launched in 2013 in France. The aim is to create personalized
with new elements that correspond to IoT domain and that services and new technologies to improve disability-free life
can explicitly define IoT devices within a business process expectancy and to help dependent elderly people as well as
[18], improving resource Optimization and monitoring and their care-givers on a day-to-day basis. Most countries all over
task execution via IoT context-specific knowledge provisioning the world live the demographic transition of aging population.
[19], improving business process execution via an IoT-aware According to the united nations, the number of people with
business process execution that exploits IoT for BPM by 80+ years old will triple between 2015 (126.4 millions) and
providing IoT data in a process-aware way [20], or proposing 2050 (446.6 millions). If we take France as an example, in
an architecture for IoT-BPM integration in order to cope with 2015 the number of people with more than 60 years old is
the issues and limitations raised by the recent case studies in 12 thousands, which represents 18% of the French population
both industry or academia. and they will represent more than 1/3 of the population by
In this paper, we focus on how to improve BPM through 20601 . Since the demographic change is becoming a global
IoT integration via an end-to-end architecture. This integra- phenomenon, several companies are focusing on developing
tion will help us to proactively manage the business process products and services to create age-friendly societies.
instances, that are launched by different IoT devices, based on The risk of diseases, loss of capacity and falls increase with
their priority level. Although academia and industry have taken age. Losing physical capacities due to age or some kind of
an interest in this integration, there is still a lot of research accidents can lead to serious falls of elderly people and those
work to be done in order to propose effective methodologies, falls can have adverse repercussions. In fact, The physical con-
design patterns and architectures to ensure efficient and smooth sequences of a fall differ from one individual to another. They
integration and communication between the IoT domain and can represent a decrease in mobility and an increase in daily
BPM. life activities dependency. Falls have also some psychological
In the literature, several research works are paving the way consequences such as a loss of self-confidence, which can
for BPM and IoT combination and integration, in order to accelerate functional capacities decline. Falls among seniors
optimize BPM using IoT and allow BPM to benefit from this result in a significant number of hospitalizations, with hip
new advanced technology. To go into more detail about our fractures being the main cause. Besides, falls are the leading
proposal related to IoT-BPM integration/Communication, it is cause of injury-related death.
appropriate to ask some research questions in order to define Several studies have been conducted in the field of silver
our problem in more concrete way. economy, in order to determine a standard definition of a fall
and the number of falls over a specific period to consider an
• Q01 : What is the state-of-the art regarding the inte- old person as a repetitive case. In [25] [21] [22] [23][24] a
gration/communication between IoT and BPM? fall represents “an unintentional change in position resulting
• Q02 : What design strategy or methodology can in coming to rest at a lower level or on the ground”. To
we follow in order to achieve a successful integra- characterize the repetitive aspect of a fall, we must determine
tion/communication between IoT and BPM? the number of falls and the time interval between falls. As
we can see in Table I, the majority of published studies
• Q03 : What are the encountered issues when integrat- consider at least two falls to retain repetitive character, with
ing IoT and BPM? an interval between two falls ranging from 6 to 12 months on
• Q04 : And given that data and event are the common average. Quick intervention after a fall, using a fall detector
points between IoT and BPM, to what extent can the for example, could avoid 26 % of hospitalizations, i.e. 160 M
functionalities offered by data analysis and complex Euros and 9,400 deaths per year. There are several solutions
event processing be exploited for an end-to-end IoT- for Fall Detection such as:
BPM architecture?
• Passive Solutions: where the senior must press a
The reminder of this paper is organized as follow. Section beeper to notify in case of an incident.
2 presents our context of work, illustrated with a real-life • Active solutions: these solutions require the use of
scenario. Section 3 overviews BPM, IoT and the integration sensors (Accelerometer, biological signals) or envi-
of these two technologies. In Section 4, we present in more ronmental detectors (presence, ground, doors...). In
details our approach. In Sections 5, 6 and 7 we present an case of a particular variation of the signals, the device
overview of our proposed IoDEP architecture from different triggers an alert.
perspectives. In Section 8 we describe the implementation of
our approach (via an initial block validation), and we discuss 1 https://www.insee.fr/fr/accueil
www.ijacsa.thesai.org 901 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
• Video-surveillance Solutions: the camera sensor an- they can detect hundreds of falls and risky situations and then
alyzes the senior’s behavior and triggers the alert assist the person in danger in less than five minutes. However,
accordingly. these ambient cameras videos generates a lot of false alerts,
triggered by an active person or a moving curtains for example,
Some of these solutions (bracelets, presence detectors, that are send to the back-office alert workflow management
active floors...) are ”blind”. This means that they do not allow system. Given that the human agent handles the received alerts
to know if a fall is a serious one or not, based on the received in a first in first out (FIFO) order, sometimes true and critical
alert. Only the image delivered by the video fall detectors, alerts may stay on a waiting list for few minutes until the
allows us to remove doubt about the incident and therefore agent handles all the false alerts or less critical ones that
avoid unnecessary interventions and therefore minimize the were received before the true one, as the incoming events are
overall cost of the service. Predicting and preventing falls intercepted, queued and launch the process instances . So if we
among elderly, is the main objective of our case study, in do not integrate a mechanism to help the human intelligence by
fact to apply our approach, we will use a data set and a prioritizing the event generated by a (very) serious case, high
business process model from a Video surveillance company. latency will induce delays that can be disruptive, depending
This company edits an automatic falls detection system for on the severity of the case.
elderly people and offers a 24/7 automatic alert solution and a
quick rescue without the intervention of the person in danger.
III. BACKGROUND AND L ITERATURE OVERVIEW
Fig. 1 depicts our incident management process, using
BPMN, which aims to manage falls alerts from detection to In the literature, several research works are focusing on
assistance and resolution. This incident management process is combining BPM and IoT. We start this section with a gen-
based on an analysis in real-time of alerts received from 24/7 eral BPM and IoT background. Then we present a literature
streaming cameras (IoT devices) for detecting elderly people’s Overview about BPM and IoT integration.
falls. Waiting too long (sometimes even for few minutes) can
be so risky as it can complicate the situation and also it can A. Introduction to Internet of things
be so painful for the person. That is why a quick rescue is
mandatory to assist the person after a fall or an incident. Smart objects swept in our life to facilitate it in so many
To achieve this prompt intervention, smart video surveillance ways and in different domains such as transportation, health
cameras are installed at client’s home or patients rooms at care, hospitalization, civil protection, smart home, smart cities,
geriatric services. These devices detect suspicious scenes that emergency, and individual automation. From smart phones
may be a fall or an incident, take a picture of the scene and then to new smart objects that interact not only with people but
send automatically an alert to the video-surveillance center. with other machines (Machine to machine communication).
This received alert is handled by a human agent, who qualify The concept of the ”Internet of Things” first emerged in
the alerts into four categories, as described below, and after that a presentation by K. Ashton, on the connection of Radio
he/she determines whether an assistance action is necessary or Frequency Identification (RFID) to the supply chain of Procter
not according to the criticality level of the alert. That is why, and Gamble in 1999. Since then, IoT has been exploding and
each alert received requires a quite vigilant treatment, in order invading our daily lives in different aspects (smart phones,
to be sure of its category, because the margin of error in this smart door locks, self-driving smart cars, smart cameras, smart
type of system must be very small, as those falls, in case of medical devices, etc.). This new technology started to thrive
a delayed intervention or an incorrect qualification, may have right after the development of the web in the 1990’s and mobile
an adverse impact on the person concerned: 1) False alerts Internet in the 2010’s. The internet of things (IoT) is growing
(level 0): Empty place. 2) False alerts (level 1): Active person. by leaps and bounds. It is made up of billions of smart devices
3) Alerts with average level (level 2): Seated person. 4) High that use wireless technology to communicate with each other
level alerts (level 3): Person lying down. and with us. IoT infrastructures can range from connected,
instrumented devices providing data to intelligent, standalone
Video-surveillance systems have proven their efficiency, as systems. IoT enables ”a world where things can automatically
www.ijacsa.thesai.org 902 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
Fig. 1. Motivating Scenario: Qualification and Assessment of the Risk Level of Incidents Process.
communicate to computers and each other providing services processes as a set of interrelated or interacting activities that
to the benefit of the human kind” [26]. transform inputs into outputs elements. For Harrington in [30],
he presents business processes as an activity or set of activities
Connected devices collect data by sensing their environ- that uses an input, adds some value to it, and delivers it as an
ment, and exchange data with other devices and humans. output to an internal or external customer. Dumas et.al [31]
All devices (things) act locally withing their environment. represent a business process as a collection of inter-related
Whereas, the IoT allows them to be remotely monitored via events, activities, and decision points that involve a number
existing network infrastructures, including the Internet [19]. of actors and objects, which collectively lead to an outcome
IoT contribute to continuously feeding ”big” data to every that is of value to a customer. All these definitions and many
node [27]. Besides, the evolution of the IoT invokes significant others present business processes as a set of activities and tasks
opportunities for private data exchange enabling new business that exploit the different resources (human and/or machine) of
models across heterogeneous networks [28]. However, it can- the organization to achieve one or more objectives previously
not generates value. That is why, it is necessary to couple it defined, in order to satisfy an internal or external customer.
with other technologies to transform this huge amount of data Each business process is attached to a single enterprise, but
into useful knowledge, in order to make meaningful decisions. in some cases it may interact with other business processes
belonging either to the same organization or to other organiza-
B. Introduction to Business Process Management tions. In order to achieve its objectives and ensure efficient per-
formance, the organization must subject its business processes
The Process approach has been increasingly adopted by to a continuous improvement mechanism. This mechanism
companies since the 1980s, leading to a new organizational represents the BPM life-cycle [31]. In fact, BPM life cycle is
model and a new way of operating in different organiza- about discovery, modeling/(re)desing, executing, analysis and
tions. Faced with a changing and competitive environment, monitoring of business processes in a perpetual repetition in
traditional approaches that treat the company as a closed order to optimize and automate these processes as much as
environment are no longer appropriate. Indeed, the process possible, and also to accommodate the ever-changing business
approach is a systemic approach that aims to transform the requirements.
hierarchical and vertical structure of an organization into a
transverse structure whose ultimate goal is the satisfaction of Business processes therefore occupy a very important place
external and internal customers. It is a method of analysis and in the field of information systems, because they play a core
modeling intended to ensure collaborative work in order to role within every organization. Moreover, the performance
control and improve the efficiency and smooth running of an level of any organization is indirectly linked to the efficiency of
organization. its processes and the quality of their models. In fact, a proper
management of business processes within an organization can
This method is mainly based on the concept of business have a very positive impact on the efficiency and smooth
processes. A business process is the structure of activities running of its activities, as it allows this organization to have
and actions as they occur in the real world. It defines all a clear vision of its objectives in order to better meet the
the possible paths in the real process and the rules that requirements of competitiveness that are constantly increasing.
determine the path to follow and the actions to perform
[29]. The International Standards Organization (ISO) defines BPM provides already different methods and solutions to
www.ijacsa.thesai.org 903 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
manage and analyse data and events. Among these methods we of event processing using the Complex Event Processing (CEP)
have Business Process Intelligence (BPI). In fact BPI systems engine. CEP is used to exploit and correlate large event streams
provides solutions to enhance decision making throughout a generated by heterogeneous data sources in order to produce
wide range of business activities, by analysing, predicting, useful information.
monitoring, controlling and optimizing business processes
[32]. Although, BPI has proven to be efficient for post- C. Event-Driven Business Process Management
execution prediction of future process behavior, it is unable
to manage and process huge amounts of real-time data and Although, IoT is becoming the hot spot area of techno-
events that are generates from different sources [33]. This logical innovations and economic development promises for
becomes more difficult when integrating IoT devices in a many industries and services, it still at its infant age, as we
BPM architecture. Another solution provided by the BPM have seen previously. During the last years, both academic
field, when dealing with real-time event data is Business and industrial world have been interested in this field and
activity monitoring (BAM). In fact, BAM is used in order to its integration with other domains. However, there is still
analyse data related to activities that have been executed. It a lot of research work to do to propose methodologies,
complements ex-post analysis of process execution by continu- design models and architectures in order to ensure an effi-
ously identifying specific situations at run-time and responding cient and smooth integration and bidirectional communication
to them by triggering specific actions [34]. However, this between IoT field and BPM. Dealing with event in BPM
technology remains less effective in use cases that includes field is not recent. Event-Driven Business Process Management
IoT generated events. The limitations of traditional BAM in (EDBPM) concept represents an enhancement of Business
IoT case studies can be seen from two aspects: prediction Process Management, by including other concepts such as
and proactivity. The first aspect is manifested in the complex SOA (Service Oriented Architecture), EDA (Event Driven
event correlation identification [35]. In fact, by sensing their Architecture), SaaS (Software as a Service), BAM (Business
environment, IoT devices generates a massive volume of event Activity Monitoring) and CEP (Complex Event Processing)
data that need to be processed and analyzed in order to extract [40]. This concept was first used in 2003 in a white paper of
useful information and to detect (complex) event patterns in Bruce Silver Associates in connection with the FileNet P8-
real-time. However, traditional BAM does not provide rule- BPM platform [41]. The idea behind EDBPM was limited to
based engines. This limitation becomes more apparent when a single event processing, because the concept of CEP was
the events are generated from diverse data sources, because not well known back then. So early applications of EDBPM
BAM lacks flexibility in integrating multiple heterogeneous was mainly focused on business process monitoring and on
data sources [33] [36] [37]. The second aspect is linked to the Key Performance Indicators (KPIs), or metrics measurement
absence of proactivity in BAM solutions. In fact, using BAM [42]. Despite the fact that the concept of CEP was used for the
in a reactive way is no longer sufficient, especially when we first time in 2002 by David Luckham is his book ”the power
have this huge amount of real life data and events. of events” [43]. It was until 2007 that an integration of CEP
in BPM field has been considered for the first time [44]. The
In business environment where every single event is im- integration of CEP technology within BPM is then known as
portant and need to be processed, Event Driven Architecture EDBPM.
(EDA) needs to be adopted. Now with the emergence of IoT,
events are becoming increasingly important for the current Recently, the EDBPM research area has been growing
information systems (SI), especially for organizations that significantly again due to the omnipresence of IoT devices.
integrate IoT devices and senors in their business operations We find applications that integrate IoT, CEP and (ED)BPM in
(video surveillance, Health care, ...). EDA is the successor of several research area and business sectors such as Health-care,
service Oriented Architecture (SOA). The idea behind this logistics, manufacturing, banking, smart cities/homes, cultural
paradigm is that everything is an event, all the different heritage, agriculture, etc. ([45], [46]). Hence the interest to
components of this architecture interact with each other by propose an architecture that integrates all these technologies
events. In this architecture each component is either an event side by side, in order to achieve a proactive event/instance
consumer or an event provider. Event consumers subscribe to management.
an intermediate event handler, and providers publish to that
handler. When the event handler receives an event from a D. Integration BPM with IoT: Literature Overview
providers, the handler forwards it to the consumer [38]. The During the last years, both academic and industrial world
difference between EDA and SOA is that SOA is based on have been interested in this field and its integration with other
the ”request/response” concept where the consumer of the fields. However, there is still a lot of research work to do
service sends a request to the producer, and the producer sends to propose methodologies, design models and architectures
a response that contains either the result or feedback. While in order to ensure an efficient and smooth integration and
EDA is based on the ”publish/subscribe” concept where the bidirectional communication between IoT and BPM.
communication pattern between the consumer and the provider
is reversed. So in this architecture consumers do not start the We discuss this related work from two perspectives. The
communication channel, but they receive the events published first perspective is the impact of IoT on business process.
by the event providers, which means that the communication The second one is the different problems and difficulties
is made in an unidirectional way [39]. encountered when we try to integrate IoT and BPM.
The main interest of the EDA is to manage real-time 1) How IoT Can Impact Business Process?: The alignment
process events and data in an efficient way. This message- of IoT and BPM is the focus of several research works.
driven architecture enables the introduction of a higher level However, this alignment comes with various challenges that
www.ijacsa.thesai.org 904 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
need to be tackled. Both technologies will affect and of course Table (II) summarises and classifies these Business process
benefit from each other [19] [51]. However, in this paper, we related limitations according to the different phases of BPM
focus only on the influence / benefit of IoT on BPM. life-Cycle.
The integration of IoT can provide several benefits for 2) Problems Encountered in IoT/BPM Integration : The
BPM. Besides, it can also address some business process integration of IoT with BPM certainly contributes to business
related limitations. Among these limitations we have: process improvement. However, this integration comes with
• Physical surrounding:Business processes have no several issues and challenges. In [57], authors present the
access (or limited access) to physical surrounding, challenges that need to be addressed in Business Process Man-
as they operate in a cyber surrounding. Taking into agement Systems (BPMS) to achieve an efficient integration
consideration the physical surrounding at modeling of IoT, such as the absence of direct interaction between
phase can lead to correct resolution and execution of the business layer and the edge network, or the problem of
business processes [18] [47] [48]. complex and inflexible business process models due to a lack
of standardization and interoperability when modeling IoT
• Context-insensitivity: Business processes are insen- elements and components in BPM. The unexploited potential
sitive to context, they are considered as blind and of extracted data from sensing environment represents a chal-
stateless, which mean that in each business process lenging issue when integrating IoT with BPM [58]. Security
execution we do not take into consideration neither the and data privacy represent another level of IoT/BPM integra-
results from last process instances nor the context (a tion concerns [19]. Many other challenges exist and need to
context-aware business processes execution). So they be tackled when dealing with an IoT and BPM integration
need to know the conditions and situations in which and alignment, these challenges have been summarized by
IoT operates, given that IoT is by default context C.Janiesch et.al in their manifesto [19].
sensitive through devices/sensors [47] [20] [49] [50]
[51]. In this article, we focus mostly on the challenges linked to
event processing and also learning aspect withing an IoT-BPM
• Data-input: Business processes have no direct access architecture. The next section details this proposed approach.
to data generated by different devices ans sensors. This
data could be exploited to BP execution to progress
via taking actions (e.g., IoT-based trigger events/alerts, IV. P ROPOSED A PPROACH
IoT-based decisions...) [51] [16] [20] [47]. Event-driven business process management is mainly
• Models complexity: Integrating IoT technology can adapted in organizations that have a real-time based ac-
reduce the complexity of process models (for example, tivities which involved some sensors or some IoT devices
replace elements or patterns, ...). It Can also extend that collect data and generate new events by sensing their
and enrich process models. As a result, we have more environment [55]. However, a real-time system must have
precise process definitions that accurately reflect the three main characteristics to ensure better functioning inside
operational reality [51]. any organization [59]: 1) High availability, 2) Low latency
and 3) Horizontal scalability. Those three characteristics are
• Transparency: Integrating IoT technology enhances mandatory to achieve a real-time and efficient scheduling and
business process monitoring by increasing BP trans- event management in BPM.
parency through data provided by IoT sensors [51].
So in order to ensure a (near) real-time priority-based
• Latency: The incorporation of IoT technology can
business process instances management, we resort to an inte-
ultimately lead activity run time reduction and signif-
gration of four concepts: IoT (to sense the environment), CEP
icant latency that can result in an overall performance
(to detect situations of interest since it is considered as the
enhancement [51].
standard course for real-time analysis and situation detection
• Event-logs quality: IoT sensors produce a huge [60]), Machine Learning (to analyse our data, find patterns
amount of data that enrich process event logs. Given in it and then make predictions, to facilitate decision making),
that event logs are the fuel of process mining tech- and BPM (to manage our business processes). The idea behind
nology enriched event logs provide enriched process this integrated quaternity of technologies (see Fig. 2) is: 1) to
models [51] [52]. accompany data an event explosion resulting from IoT, 2) to
www.ijacsa.thesai.org 905 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
B. Functional Requirements
Business processes are supposed to be smoothly executed
under different business situations and context. This constantly
changing environment, requires having business processes that
can easily be adapted to the appropriate action taken. However,
Fig. 2. Quaternity View of BPM, IoT, Machine Learning and CEP. without being coupled to other technology, business processes
are still deficient regarding the critical ability to provide
assistance to their users [62] due to a lack of two important
aspect:
examine large data sets in order to uncover hidden patterns,
unknown correlations between collected events, either at a very • Context-awareness: The emergence or even the om-
technical level (incident/anomaly detection, predictive main- nipresence of IoT solutions in different businesses
tenance) or at business level (customer preferences, market forces organizations to adapt their processes to a high
trends, revenue opportunities) 3) to capitalize business value level of connectivity. Context-awareness is a funda-
from data generated by IoT sensors, 4) to provide improved mental characteristic of ubiquitous computing [53],
operational efficiency, better customer service, competitive and it is the key to benefit from sensors collected raw
advantages over rival organizations. data, as it allows to store contextual information re-
lated to these raw data and to decide which data should
To turn this conceptual integrated quaternity of technolo- be processed, in order to facilitate the interpretation
gies into a concrete reality, we propose an end-to-end IoT-BPM [54] especially at the level of business processes.
architecture (IoDEP: IoT-Data-Event-Process). This integration
architecture follows Haze Architecture and Cascading Analyt- • Knowledge feedback loop: Traditional BPM systems
ics [61], incarnated by a DIKW (Data Information Knowledge present different limits, as they do not facilitate the
Wisdom) discovery pattern crossing the architecture from use of knowledge extracted/generated from data by
device then Fog/Edge to the cloud, and a learning feedback business processes after their execution. As a result,
loop that feeds forward insight to adjust either Fog/Edge tremendous amount of data and event data that are
or device algorithms [55]. IoT-BPM integration involves bi- constantly collected within the organization is not
directional communication. It is possible to acquire data/event exploited to improve business processes. As a matter
from sensors (e.g., monitor and control IoT devices) to manage of fact, these data represent for enterprises a real
business process instances and to send instructions to those engine of growth. However, a large amount of raw
devices (e.g., reset, adjustment or shut them down). One of data is not valuable; data must go through a whole
the requirement of our proposed architecture is scalability process to extract value from it [63]. The analysis of
without imposing an architecture redesign. That is the reason huge data helps organizations to extract information
behind using Haze Architecture and Cascading architecture as and then knowledge, because the real value is in
it ensures fluidity and dynamism. how organizations will use that data and turn their
organization into an information-centric company that
relies on insights derived from data analyses for their
A. Research Design / Modeling Methodology
decision-making.
As we said previously, in order to handle the challenges
faced by BPM when dealing with IoT objects, IoT and BPM To accompany data an events explosion resulting, among
need to meet in the middle. The Incorporation of two heavy others, from IoT, data analytic processes combined with event
paradigms such as IoT and BPM generates, with no doubt, processing techniques, examine large data sets to uncover hid-
a modeling methodology issue. This issue becomes more den patterns, unknown correlations between collected events,
complicated when this integration involves other technologies either at a very technical level (incident/anomaly detection,
(CEP and ML in this case). There are three types of modeling predictive maintenance) or at business level (customer pref-
methodologies: - The Top-down approach, - The Bottom-up erences, market trends, revenue opportunities) to provide im-
approach, - and the Meet-in the- middle approach. We propose proved operational efficiency, better customer service, compet-
in this article a meet-in-the-middle approach, to facilitate the itive advantages over rival organizations. In order to capitalize
integration of IoT and BPM. In fact, The meet in the middle business value of data and events generated by IoT sensors and
approach is considered as a method of refinement going alter- business process execution, IoT and BPM need to meet in the
nately from top to bottom to bottom to top. The combination middle, as we said previously. One critical use case for IoT
of deductive and inductive iterative sprints in this approach is to warn organizations when a product or service is at risk.
allows both re-use/mutualization and disruptive thinking. In Early detection is essential to either remedy the issue before
this paper, we propose an integration of IoT and BPM via it becomes a real problem or quickly do cleanup when failure
www.ijacsa.thesai.org 906 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
Fig. 3. ITIL Incident Management Process Functions vs IoDEP Architecture Analysis Matrix.
previous steps.
• Pre-qualification: This step is reinforced with the
learning feed back loop [55], by learning from past
decisions, mainly false alerts. This final step will
consider and exploit the overall context to correct
future risk assessments.
At the end of these steps, the detected alerts/events are
sent to the cloud. Intercepted events are queued in order to be
qualified by a human resource.
stored in databases. CEP engines provide the scalability and the priority of the business process instances that need to be
the (near) real-time processing to filter, to combine and to executed.
extract actionable knowledge, known as situation of interest,
from a stream of events (see Fig. 5). C. The Cloud Layer
Complex situation of interest can be easily expressed using Both fog and edge computing are extensions of cloud
CEP engines and rules. For example, in our case study, queries networks. The majority of enterprises are already familiar with
such as: prioritize a case if the patient has some particular cloud since it is the de facto standard in most industries.
needs (Wheelchair, walker, etc.) or trigger an alert if the patient The concept of ”cloud” was used in several contexts in the
is a recidivist faller. 1990s, but only in 2006 when it became associated with
The combination between CEP and BPM is not recent. In offering services over the internet [82]. Cloud computing
fact, it has been widely used to control and monitor business is ”a model for enabling ubiquitous, convenient, on-demand
processes in real time in order to improve the effectiveness network access to a shared pool of configurable computing
of business operations by keeping track of what is happening resources (e.g., networks, servers, storage, applications, and
now and raising awareness of issues as soon as they can be services) that can be rapidly provisioned and released with
detected [75]. CEP helps to monitor not only process instances minimal management effort or service provider interaction.”
and activities during run time, but also different events that are [83]. Cloud layer facilitates storing and accessing data and
related to business process but not necessarily generated from programs over the internet (as a service) rather than on servers
the process instances [76]. Several approaches and solutions of the enterprise as we can see in Fig. 6. In fact, it offers
based on the integration of CEP with BPM have been proposed the ability to drastically outgrow an organization’s normally
for run time or design time ([77], [78], [79]) just to name a available storage, without having to host any additional servers.
few. In our IoDEP architecture, Data and intelligence are pushed
through layers from edge to cloud in order to be analysed
The starting point of this incident management approach and processed. The knowledge produced goes through a learn-
is the real time analysis of the incoming generated events, ing feedback-loop that feeds forward insight to adjust either
using CEP engine to detect the events with the highest priority Fog/Edge or device algorithms. To produce this knowledge, we
withing all the incoming ones, that will launch our business use machine learning algorithm. In the following, we introduce
process different instances. And based on this estimated pri- this technology and present in more details the algorithm used
ority we can schedule those instances. In fact, the business in our approach.
process instances triggered by those events will then have
the highest priority to be assigned to the available human a) Machine Learning: Integrating IoT in a BPM envi-
resources. In order to process the incoming events and then ronment generates several challenges, among these challenges,
detect meaningful patterns concerning the important situation we have the huge amount of data and event data that are
of interest (which represent for us the events with the highest continuously gathered. Data and event data are the key to get a
priority), CEP engine needs a set of rules that are determined in better understanding of the functioning of business processes.
advance. A rule for us in this approach represents a condition This data represent for enterprises a real engine of growth.
(IF...THEN ...) that characterizes the event source (the different However, a large amount of raw data is not valuable; data
sources that generate each event). So in the processing step, must go through a whole process to extract value from it. In
whenever a condition is satisfied by the event, the priority of fact, pre-processing and exploring data before using it help to
this event increases. get correct assumptions and insights in order to make correct
predictions and finally take correct and accurate actions and
CEP strength relies basically on concept of rules and decisions such as instances scheduling, resources management,
operators. CEP engines are mainly based on a set of rules or business process models redesign. The analysis of this huge
provided by a rule engine. A rule engine represents a part generated data helps organizations to extract information and
of a CEP engine that generates rule models. These rules then knowledge, because the real value is in how organiza-
are used in order to create and/or modify business logic in tions will use that data and turn their organization into an
a Business Process Management System (BPMS) [80] for ”information-centric company that relies on insights derived
example. CEP rules are based on CEP operators. Among from data analyses for their decision-making”4 . Hence inte-
these operators we have: aggregation operators, sequencing grating data analysis techniques, process mining, data mining,
operators, logic operators, single-item operators, windowing machine learning algorithms or even deep learning in each step
operators, and flow management operators. Those rules are, in of business process life cycle is very crucial for the process
most of the time, manually predefined by domain experts, and improvement. In our approach, we have chosen to exploit the
after that implemented in CEP systems such as Esper, Siddhi, machine learning algorithms in order to enhance one aspect of
FlinkCEP3 , or Oracle. Since defining these rules manually can business process life-cycle, which is the instance management.
be error prone and time consuming, there are many recent
approaches that propose an automatic CEP rules learning and Machine learning is a branch of the artificial intelligence
generation [1] [81] [74]. However, the automatic CEP rules research domain. Using mathematical methods, Machine learn-
learning and generation is out of the scope of this paper, ing enables systems to learn from data and generate knowledge
because the main purpose of this paper it to pave the way from experience. With time and more experience, the system
for the use of CEP in order to achieve a real-time analysis of can learn and improve and sharpen a model that can be
incoming events in order to detect situations of interest, about used to predict outcomes of questions using previous learning
3 https://nightlies.apache.org/flink/flink-docs-release-1.14/docs/libs/cep/ 4 https://datafloq.com/read/3vs-sufficient-describe-big-data/
www.ijacsa.thesai.org 909 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
[84]. Machine learning algorithms are organized into different VI. OVERVIEW OF THE F RONT- END AND BACK - END OF
categories based on the learning type: supervised learning, un- THE A RCHITECTURE
supervised learning, semi-supervised learning, Reinforcement
learning, and Transduction learning. Supervised learning and From a front-end and back-end perspective, our architec-
unsupervised learning algorithms are the most used in real ture can be seen as follows (see Fig. 3):
world problems. They can be further grouped into different The IoDEP Front-end architecture is composed of two
categories that we can find in real world machine learning parts:
problems. However, the choice of the appropriate algorithm
depends on your case study, the type of data manipulated, and • Connected Device/Sensor Processing and Analyt-
the purpose of your analysis. ics: insure acquisition of incident data, and incident
data filtering and Simple classifier.
The first step of our approach aims to ensure an efficient • Fog/Edge Processing and Analytics: insure the fol-
acquisition, filtering, and analyzing incident/event data gen- lowing functionalities:
erated by IoT devices. The second step consists on scoring 1) incident data processing: Detection of
the generated events from IoT devices, based on the result of anomaly incident.
the first step, using unsupervised machine learning algorithm. 2) incident data analytics: Pattern recogni-
We opted for clustering algorithms to discover groups in our tion/correlation/scoring (advanced supervised
dataset, in order to achieve a categorization of the event time-based analysis algorithms here need
sources that trigger our process instances. We choose K-means smaller training set but may need more per-
clustering algorithms, which is a partitioning technique used formance resources like GPU).
to analyse data based on the distance between different data 3) incident data routing: Transmission of
points in the input dataset. This algorithm was described by the anomaly information through an Edge
Hartigan in 1975. The idea behind K-means algorithm is to Spooler.
divide a dataset composed of M data points in N dimensions
into K clusters, in such a way that the within-clusters sum The IoDEP Architecture Back-End is represented by sev-
of squares is minimized [85]. The most complicated part of eral components insuring cloud side processing and analytic
this algorithm is the determination of the right value of K of incident management:
which represents the number of clusters. In the literature,
we can find several methods for selecting the most optimal • Cloud Data Processing and Analytics: Ensure the
number of clusters for this algorithm such as: The Elbow following functionalities:
method [86]: The Average Silhouette method [87], or the GAP 1) incident data routing: Transmission of the
statistic method [88]. When applying K-means algorithm in anomaly information to the relevant back end
our approach, we have used the Elbow method to determine processing and analytics system – ESB/CEP.
the value of K. The basic steps of K-means algorithm are 2) incident data analytics and intelligence:
shown in the following pseudo-code: Extraction, cleaning and annotation, In-
tegration, aggregation and representation,
Modelling and analysis Pattern recogni-
Algorithm 1 K-Means Clustering Algorithm tion/correlation/scoring (more sophisticated
Input: supervised machine learning algorithms (e.g.
S = s1 , s2 ..... sm // list of data points (list of sources which deep learning) may here need big training
generate the different events) sets) (Big Data).
K //Number of clusters 3) incident data processing: Anomaly Hu-
1: choose K Random data points from S as initial clusters man Processes (Human qualification of the
centroids anomaly information) and Enterprise Business
2: repeat Processes (BPMS based on Big Data analyt-
3: Assign each data point si to the cluster which has the ics), and Interpretation: Through on Report-
closest centroids. ing incident KPI Scoreboards based on (Data
4: Calculate the new centroids of each cluster. Warehousing and Data visualisation).
5: until Convergence //no more changes for centroids
Output: Set of K clusters VII. A PPLICATION A RCHITECTURE OVERVIEW
In this section, we present a concrete application of our
architecture (see Fig. 6). The content of the Edge layer can
differ from one case study to another. For our case study, IoT
We tested several criteria such as the frequency of falls or devices were represented by smart cameras that detect the falls
total number of falls, in order to have the most representative of patients. In other context, these devices and sensors could be
clustering for our data. We apply K-means algorithm on a set either Smart locks, Fire and smoke alarms, or smart wristband,
of events sources in order to classify those sources on different etc.
clusters using a score that we calculate for each event’s source
(a patient in our case) based on the frequency of previously Our Fog layer represents the real-time stream processing
generated events and their criticality value given previously by layer using CEP technologies. We propose the use of Apache
the agents (human resources) in the qualification step. Flink framework as it facilitates complex event processing
www.ijacsa.thesai.org 910 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
www.ijacsa.thesai.org 911 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
CEP Message broker: Total event number Computation time (sec) - Solution 1
100 19.0
200 19.45
As we have seen before, in order to manage the different 300 25.48
incoming events within a CEP solution, we need a message 400 31.3
broker. In this experiment, we have chosen RabbitMQ7 . It is an 500 37.4
open source message broker, lightweight and easy to deploy.
TABLE IV. C OMPUTATION T IME ( SEC ) FOR S OLUTION 2 - NCA
Global Schema of Event-pattern detection with CEP Total event number Computation time (sec) - Solution 2
solution: 100 22.07
200 32.14
Fig. 9 illustrates our first attempt to integrate CEP engine 300 44.25
in our IoT-BPM architecture. 400 55.6
500 70.62
www.ijacsa.thesai.org 913 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
national Conference on Business Information Systems, pp. 136–147, [27] J. Rifkin, The zero marginal cost society: The internet of things, the
Springer, 2011. collaborative commons, and the eclipse of capitalism. St. Martin’s
[9] M. Khanbabaei, F. M. Sobhani, M. Alborzi, and R. Radfar, “Developing Press, 2014.
an integrated framework for using data mining techniques and ontology [28] E. Natalizio, Mobility as a Primitive to Improve Communications in
concepts for process improvement,” Journal of Systems and Software, Wireless Networks. PhD thesis, UTC Compiègne, 2017.
vol. 137, pp. 78–95, 2018. [29] D. Grigori, Eléments de flexibilité des systèmes de workflow pour la
[10] W. Van Der Aalst, A. Adriansyah, A. K. A. De Medeiros, F. Arcieri, définition et l’exécution de procédés coopératifs. PhD thesis, Université
T. Baier, T. Blickle, J. C. Bose, P. Van Den Brand, R. Brandtjen, Henri Poincaré-Nancy 1, 2001.
J. Buijs, et al., “Process mining manifesto,” in International Conference [30] H. Harrington, “P. american society for quality control quality, busi-
on Business Process Management, pp. 169–194, Springer, 2011. ness process improvement: the breakthrough strategy for total quality,
[11] S. Aguirre, C. Parra, and J. Alvarado, “Combination of process mining productivity, and competitiveness,” 1991.
and simulation techniques for business process redesign: a methodolog- [31] M. Dumas, M. La Rosa, J. Mendling, H. A. Reijers, et al., Fundamentals
ical approach,” in International Symposium on Data-Driven Process of business process management, vol. 1. Springer, 2013.
Discovery and Analysis, pp. 24–43, Springer, 2012.
[32] D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. Sayal, and M.-C.
[12] D. Redlich and W. Gilani, “Event-driven process-centric performance Shan, “Business process intelligence,” Computers in industry, vol. 53,
prediction via simulation,” in International Conference on Business no. 3, pp. 321–343, 2004.
Process Management, pp. 473–478, Springer, 2011.
[33] B. Schwegmann, M. Matzner, and C. Janiesch, “A method and tool
[13] A. Yousfi, K. Batoulis, and M. Weske, “Achieving business process for predictive event-driven process analytics.,” in Wirtschaftsinformatik,
improvement via ubiquitous decision-aware business processes,” ACM p. 46, Citeseer, 2013.
Transactions on Internet Technology (TOIT), vol. 19, no. 1, pp. 1–19,
[34] W. Schmidt, “Business activity monitoring (bam),” in Business Intelli-
2019.
gence and Performance Management, pp. 229–242, Springer, 2013.
[14] C. Stoiber, “Exploiting internet of things for business process improve-
ment,” 2021. [35] O. Etzion and P. Niblett, “Event processing in action, manning publi-
cations,” 2011.
[15] M. M. Queiroz, S. F. Wamba, M. C. Machado, and R. Telles, “Smart
[36] R. von Ammon, O. Etzion, H. Ludwig, A. Paschke, and N. Stojanovic,
production systems drivers for business process management improve-
ment: An integrative framework,” Business Process Management Jour- “Introduction to the second international workshop on event-driven
nal, 2020. business process management (edbpm09),” in International Conference
on Business Process Management, pp. 345–346, Springer, 2009.
[16] S. Cherrier and V. Deshpande, “From bpm to iot,” in International
[37] C. Janiesch, M. Matzner, and O. Müller, “Beyond process monitoring: a
conference on business process management, pp. 310–318, Springer,
2017. proof-of-concept of event-driven business activity management,” Busi-
ness Process Management Journal, vol. 18, no. 4, pp. 625–643, 2012.
[17] R. Wehlitz, I. Rößner, and B. Franczyk, “Integrating smart devices
as business process resources–concept and software prototype,” in [38] D. Bo, D. Kun, and Z. Xiaoyi, “A high performance enterprise service
International Conference on Service-Oriented Computing, pp. 252–257, bus platform for complex event processing,” in 2008 Seventh Interna-
Springer, 2017. tional Conference on Grid and Cooperative Computing, pp. 577–582,
IEEE, 2008.
[18] S. Meyer, A. Ruppen, and C. Magerkurth, “Internet of things-aware pro-
[39] D. Luckham, “Soa, eda, bpm and cep are all complementary,” Retrieved
cess modeling: integrating iot devices as business process resources,” in
International conference on advanced information systems engineering, May, vol. 20, p. 2011, 2007.
pp. 84–98, Springer, 2013. [40] A. Estruch and J. A. H. Álvaro, “Event-driven manufacturing process
[19] C. Janiesch, A. Koschmider, M. Mecella, B. Weber, A. Burattin, management approach,” in International Conference on Business Pro-
cess Management, pp. 120–133, Springer, 2012.
C. Di Ciccio, G. Fortino, A. Gal, U. Kannengiesser, F. Leotta, et al.,
“The internet of things meets business process management: a mani- [41] R. v. Ammon, C. Emmersberger, F. Springer, and C. Wolff, “Event-
festo,” IEEE Systems, Man, and Cybernetics Magazine, vol. 6, no. 4, driven business process management and its practical application taking
pp. 34–44, 2020. the example of dhl,” 2008.
[20] S. Schönig, L. Ackermann, S. Jablonski, and A. Ermer, “An inte- [42] C. Costello, O. Molloy, and K. Hinkelmann, “Towards a semantic
grated architecture for iot-aware business process execution,” in Enter- framework for business activity monitoring and management.,” in AAAI
prise, business-process and information systems modeling, pp. 19–34, spring symposium: AI meets business rules and process management,
Springer, 2018. pp. 17–27, 2008.
[21] P. A. Stalenhoef, J. P. Diederiks, L. P. de Witte, K. H. Schiricke, and [43] D. Luckham, The power of events, vol. 204. Addison-Wesley Reading,
H. F. Crebolder, “Impact of gait problems and falls on functioning in 2002.
independent living persons of 55 years and over: a community survey,” [44] K. Danielsson and G. Trotta, “Key requirements for event-driven bpm
Patient Education and Counseling, vol. 36, no. 1, pp. 23–31, 1999. and soa.”
[22] P. A. Stalenhoef, J. P. Diederiks, J. A. Knottnerus, L. P. de Witte, [45] W. Yao, C.-H. Chu, and Z. Li, “Leveraging complex event processing
and H. F. Crebolder, “The construction of a patient record-based risk for smart hospitals using rfid,” Journal of Network and Computer
model for recurrent falls among elderly people living in the community,” Applications, vol. 34, no. 3, pp. 799–810, 2011.
Family Practice, vol. 17, no. 6, pp. 490–496, 2000. [46] R. Mousheimish, Y. Taher, K. Zeitouni, and M. Dubus, “Pact-art:
[23] P. Stalenhoef, J. Diederiks, J. Knottnerus, A. Kester, and H. Crebolder, Enrichment, data mining, and complex event processing in the internet
“A risk model for the prediction of recurrent falls in community- of cultural things,” in 2016 12th International Conference on Signal-
dwelling elderly: a prospective cohort study,” Journal of clinical epi- Image Technology & Internet-Based Systems (SITIS), pp. 476–483,
demiology, vol. 55, no. 11, pp. 1088–1094, 2002. IEEE.
[24] V. S. Stel, S. M. Pluijm, D. J. Deeg, J. H. Smit, L. M. Bouter, [47] Z. Maamar, E. Kajan, I. Guidara, L. Moctar-M’Baba, and M. Sellami,
and P. Lips, “A classification tree for predicting recurrent falling in “Bridging the gap between business processes and iot,” in Proceedings
community-dwelling older persons,” Journal of the American Geriatrics of the 24th Symposium on International Database Engineering &
Society, vol. 51, no. 10, pp. 1356–1364, 2003. Applications, pp. 1–10, 2020.
[25] K. A. Faulkner, M. S. Redfern, J. A. Cauley, D. P. Landsittel, S. A. [48] C. Friedow, M. Völker, and M. Hewelt, “Integrating iot devices into
Studenski, C. Rosano, E. M. Simonsick, T. B. Harris, R. I. Shorr, business processes,” in International conference on advanced informa-
H. N. Ayonayon, et al., “Multitasking: association between poorer tion systems engineering, pp. 265–277, Springer, 2018.
performance and a history of recurrent falls,” Journal of the American [49] R. Song, Y. Wang, W. Cui, J. Vanthienen, and L. Huang, “Towards
Geriatrics Society, vol. 55, no. 4, pp. 570–576, 2007. improving context interpretation in the iot paradigm: a solution to
[26] A. Furness, “A framework model for the internet of things,” integrate context information in process models,” in Proceedings of
GRIFS/CASAGRAS: Hong Kong, China, 2008. the 2018 2nd International Conference on Management Engineering,
Software Engineering and Service Sciences, pp. 223–228, 2018.
www.ijacsa.thesai.org 914 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 4, 2022
[50] S. Schönig, L. Ackermann, S. Jablonski, and A. Ermer, “Iot meets [69] D. Luckham, “A short history of complex event processing,” Part 1:
bpm: a bidirectional communication architecture for iot-aware process Beginnings. 1-a-short-history-of-cep-part-1. pdf, 2007.
execution,” Software and Systems Modeling, vol. 19, no. 6, pp. 1443– [70] D. Robins, “Complex event processing,” in Second International Work-
1459, 2020. shop on Education Technology and Computer Science. Wuhan, pp. 1–10,
[51] S. Schönig, L. Ackermann, and S. Jablonski, “Internet of things meets Citeseer, 2010.
bpm: A conceptual integration framework.,” in SIMULTECH, pp. 307– [71] G. Cugola and A. Margara, “Processing flows of information: From
314, 2018. data stream to complex event processing,” ACM Computing Surveys
[52] C. Sturm, S. Schönig, and C. Di Ciccio, “Distributed multi-perspective (CSUR), vol. 44, no. 3, p. 15, 2012.
declare discovery.,” in BPM (Demos), 2017. [72] D. S. Rosenblum and A. L. Wolf, A design framework for Internet-scale
[53] D. Evans, “The internet of things: How the next evolution of the internet event observation and notification, vol. 22. ACM, 1997.
is changing everything,” CISCO white paper, vol. 1, no. 2011, pp. 1–11, [73] M. Eckert and F. Bry, “Complex event processing (cep),”
2011. [74] A. Margara, G. Cugola, and G. Tamburrelli, “Learning from the past: au-
[54] Z. A. Almusaylim and N. Zaman, “A review on smart home present state tomated rule generation for complex event processing,” in Proceedings
and challenges: linked to context-awareness internet of things (iot),” of the 8th ACM International Conference on Distributed Event-Based
Wireless networks, vol. 25, no. 6, pp. 3193–3204, 2019. Systems, pp. 47–58, ACM, 2014.
[55] A. Ismaili-Alaoui, K. Baı̈na, K. Benali, and J. Baı̈na, “Towards smart [75] M. von Rosing and S. Polovina, “Business process trends,” 2015.
incident management under human resource constraints for an iot- [76] M. Daum, M. Götz, and J. Domaschka, “Integrating cep and bpm:
bpm hybrid architecture,” in International Conference on Web Services, how cep realizes functional requirements of bpm applications (industry
pp. 457–471, Springer, 2018. article),” in Proceedings of the 6th ACM International Conference on
[56] C. Soto, “Bpm and iot: The signal of true disruption,” Redmond Media Distributed Event-Based Systems, pp. 157–166, ACM, 2012.
Group, 2015. [77] M. Weidlich, H. Ziekow, J. Mendling, O. Günther, M. Weske, and
[57] C. Chang, S. N. Srirama, and R. Buyya, “Mobile cloud business N. Desai, “Event-based monitoring of process execution violations,”
process management system for the internet of things: a survey,” ACM in International conference on business process management, pp. 182–
Computing Surveys (CSUR), vol. 49, no. 4, p. 70, 2017. 198, Springer, 2011.
[58] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things [78] F. Koetter and M. Kochanowski, “A model-driven approach for
(iot): A vision, architectural elements, and future directions,” Future event-based business process monitoring,” Information Systems and e-
generation computer systems, vol. 29, no. 7, pp. 1645–1660, 2013. Business Management, vol. 13, no. 1, pp. 5–36, 2015.
[59] J. Pielmeier, S. Braunreuther, and G. Reinhart, “Approach for defining [79] P. Soffer, A. Hinze, A. Koschmider, H. Ziekow, C. Di Ciccio, B. Kold-
rules in the context of complex event processing,” Procedia CIRP, ehofe, O. Kopp, A. Jacobsen, J. Sürmeli, and W. Song, “From event
vol. 67, pp. 8–12, 2018. streams to process models and back: Challenges and opportunities,”
[60] D. C. Luckham, Event processing for business: organizing the real-time Information Systems, vol. 81, pp. 181–200, 2019.
enterprise. John Wiley & Sons, 2011. [80] B. Mazon-Olivo, D. Hernández-Rojas, J. Maza-Salinas, and A. Pan,
[61] D. Canty, “Architecting for dynamic analytics in iot..” https://dzone. “Rules engine and complex event processor in the context of internet
com/articles/architecting-for-dynamic-analytics-in-iot, 2014. [Online; of things for precision agriculture,” Computers and electronics in
accessed July-2021]. agriculture, vol. 154, pp. 347–360, 2018.
[62] S. Tjoa, S. Jakoubi, G. Goluch, G. Kitzler, S. Goluch, and G. Quirch- [81] N. Mehdiyev, J. Krumeich, D. Enke, D. Werth, and P. Loos, “Deter-
mayr, “A formal approach enabling risk-aware business process model- mination of rule patterns in complex event processing using machine
ing and simulation,” IEEE Transactions on Services Computing, vol. 4, learning techniques,” Procedia Computer Science, vol. 61, pp. 395–401,
no. 2, pp. 153–166, 2011. 2015.
[63] A. Ismaili-Alaoui, K. Baı̈na, and K. Benali, “Harnessing the power of [82] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art
data and event data for business process improvement,” in CAISAM and research challenges,” Journal of internet services and applications,
2019-Complexity Analysis of Industrial Systems and Advanced Model- vol. 1, no. 1, pp. 7–18, 2010.
ing, 2019. [83] P. Mell, T. Grance, et al., “The nist definition of cloud computing,”
[64] U. ITIL, “Introducing service operation..” https://www.ucisa.ac.uk. [On- 2011.
line; accessed January-2021]. [84] J. Bell, Machine learning: hands-on for developers and technical
[65] J.Kaplan, “When internet of things meets big data.” professionals. John Wiley & Sons, 2020.
https://www.informationweek.com/big-data/big-data-analytics/ [85] J. A. Hartigan and M. A. Wong, “Algorithm as 136: A k-means
when-internet-of-things-meets-big-data/a/d-id/1298137?,. [Online; clustering algorithm,” Journal of the royal statistical society. series c
accessed July-2021]. (applied statistics), vol. 28, no. 1, pp. 100–108, 1979.
[66] J. Gutiérrez, V. Rodrı́guez, and S. Martin, “Comprehensive review of [86] R. L. Thorndike, “Who belongs in the family,” in Psychometrika,
vision-based fall detection systems,” Sensors, vol. 21, no. 3, p. 947, Citeseer, 1953.
2021. [87] P. J. Rousseeuw, “Silhouettes: a graphical aid to the interpretation and
[67] Y. Chen, X. Kong, L. Meng, and H. Tomiyama, “An edge computing validation of cluster analysis,” Journal of computational and applied
based fall detection system for elderly persons,” Procedia Computer mathematics, vol. 20, pp. 53–65, 1987.
Science, vol. 174, pp. 9–14, 2020. [88] R. Tibshirani, G. Walther, and T. Hastie, “Estimating the number of
[68] Cisco, “”cisco fog computing solutions: Unleash the power of clusters in a data set via the gap statistic,” Journal of the Royal
the internet of things”, syst. inc., san jose, ca, usa, white Statistical Society: Series B (Statistical Methodology), vol. 63, no. 2,
paper, 2015.” https://www.cisco.com/c/dam/en us/solutions/trends/iot/ pp. 411–423, 2001.
docs/computing-solutions.pdf. [Online; accessed July-2021].
www.ijacsa.thesai.org 915 | P a g e
© 2022. This work is licensed under
https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding
the ProQuest Terms and Conditions, you may use this content in accordance
with the terms of the License.