<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Face Mask Detector for Raspberry Pi Based on Computer Vision and Edge Computing</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Zhexen Y. Seitbattalov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hüseyin Canbolat</string-name>
          <email>huseyin.canbolat@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sabyrzhan K. Atanov</string-name>
          <email>atanov5@mail.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ankara Yildirim Beyazit University</institution>
          ,
          <addr-line>Gazze Cd. No:7, Ayvali, Keçiören, Ankara, 06010</addr-line>
          ,
          <country country="TR">Turkey</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>L.N. Gumilyov Eurasian National University</institution>
          ,
          <addr-line>2 Kanysh Satbayev St., Astana, Z01A3D7</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The pandemic of the coronavirus disease 2019 has shown weakness and threats in various fields of human activity. In turn, the World Health Organization has recommended different preventive measures to decrease the spreading of coronavirus. Nonetheless, the world community ought to be ready for worldwide pandemics in the closest future. One of the most productive approaches to prevent spreading the virus is still using a face mask. This case has required staff who would verify visitors in public areas to wear masks. The aim of this paper was to identify persons remotely who wore masks or not, and also inform the personnel about the status through the message queuing telemetry transport as soon as possible using the edge computing paradigm. To solve this problem, we proposed to use the Raspberry Pi with a camera as an edge device, as well as the TensorFlow framework for pre-processing data at the edge. The offered system is developed as a system that could be introduced into the entrance of public areas. Experimental results have shown that the proposed approach was able to optimize network traffic and detect persons without masks. This study can be applied to various closed and public areas for monitoring situations.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Internet of Things</kwd>
        <kwd>Raspberry Pi</kwd>
        <kwd>Edge device</kwd>
        <kwd>pandemic</kwd>
        <kwd>TensorFlow</kwd>
        <kwd>message queuing telemetry transport</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The current world and economy have been affected by the coronavirus disease 2019
(COVID2019) and due to worldwide lockdowns and shutdowns of businesses. According to statistics declared
by the World Health Organization (WHO), it has registered 611.42 million confirmed cases of
infection by COVID-2019 and 6.512 million cases of deaths by September 2022. This respiratory
virus spreads primarily through close contact and in overcrowded areas [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Moreover, our early
research has demonstrated that values of the temperature parameter of 5-9°C, the humidity of 30-50%
and no ventilation are optimal for the virus activity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. As previous experience has shown that mass
vaccinations, quarantines, social distancing, hand sanitizing and wearing respirators, surgical masks
have had positive effects on the decrease of the COVID-2019 spreading [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. All those measures had
proved highly effective in reducing cases of deaths and patient hospitalizations.
      </p>
      <p>
        However, the world community and the WHO should be prepared for similar global pandemics in
the future. In most pandemics, it is essential to wear masks and keep up a secure distance between
persons to guarantee that the infection does not spread. In this setting, it may be an exceptional
approach to check whether individuals wear masks at the entrance to open spaces for preventive
purposes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The presence of a remote system that will perform this control instead of security staff
would be a way to decrease costs and provide health safety to personnel.
      </p>
      <p>
        Recent studies have shown that most face detection systems use various approaches for image
processing and computer vision such as Convolutional Neural Networks (CNN), Deep Learning (DL),
Keras, OpenCV, faster regions with CNN, Sensor Fusion (SF) [
        <xref ref-type="bibr" rid="ref1 ref3 ref4 ref5 ref6 ref7 ref8">1, 3, 4, 5, 6, 7, 8</xref>
        ]. F. Ozyurt, in
contrast to other studies, has introduced additional parameter to measure the body temperature of
visitors through the MLX90614 sensor and used MobileNetV2 architecture. The accuracy of his
proposed approach has reached about 97 percent [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. S. Meivel has focused on monitoring streets by
drones and measuring the social distance between people through faster regions with CNN and
YOLOv3 algorithms [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. P. Sertic has offered a hardware accelerated system using DL and tested it
on three embedded platforms: Raspberry Pi 4B with either Google Coral USB TPU or Intel Neural
Compute Stick 2 VPU, and NVIDIA Jetson Nano. The best accuracy has been achieved on the Jetson
Nano platform and equals 94.2 percent [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Besides using an Enhanced MobileNetV2 for mask
detection, R. K. Shinde has collected heart rate, body temperature and oxygen level to avoid mistakes
in defining the infected people [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Nonetheless, the considered studies above have ignored the network bandwidth and traffic issues
since those proposed systems accumulate an enormous amount of data because of the video stream
and sensor values. Those generated data often sends to the cloud for storage and processing. For
instance, a drone with camera and aircraft engines in Boeing 787 generate more than 20 gigabytes of
sensor data per hour [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        The edge computing paradigm handles the bottleneck of cloud computing for various
latencysensitive Internet of Things (IoT) applications by proposing computing resources closer to the sources
of data [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ]. Those studies have demonstrated scenarios where edge computing dominates
over traditional cloud computing, for example, in cryptographic performance [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11, 12, 13, 14</xref>
        ].
      </p>
      <p>The aim of the study was to develop the algorithm of face mask detection through computer
vision, and after that provided prompt transmission data to an end user using edge computing and
message queuing telemetry transport (MQTT).</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and Methods</title>
      <p>To reduce the cost of the developed system, we proposed to use a Raspberry Pi 4 Model B (4
Gigabyte) as an edge device with an OmniVision OV5647 camera, which is shown in Figure 1.</p>
      <p>
        Raspberry Pi is a single-board computer that can find applications in both cloud and edge
computing paradigms. Other pros of the Raspberry Pi are the intermediate speed processor, the
presence of a peripheral interface and network support, which provides the opportunity to gather and
analyze received data from IoT devices [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>Raspberry Pi OS (Raspbian) has been selected as an operating system for Raspberry Pi.</p>
      <p>
        As we noted earlier, the MQTT has been used as a messaging protocol between the edge device
(publisher, Aedes Broker) and end users (subscribers, MQTTBox) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The broker layer scheme is
demonstrated in Figure 2, where the MQTT broker has been applied to transmit text data to the end
user devices (smartphones, laptops and personal computers).
      </p>
      <p>Camera OmniVision OV5647</p>
      <p>Publish
Raspberry Pi 4 Model B</p>
      <p>Message Queue Telemetry Transport
(MQTT) Broker</p>
      <p>Subscribe/Publish
Subscribe/Publish
Subscribe/Publish</p>
      <p>Mobile Phone</p>
      <p>MQTT Dash
Laptop
PC</p>
      <p>This layer was responsible for receiving data from the broker layer in which Raspberry Pi was
applied as a service or a platform. We have configured Node Red to organize the data flow and visual
programming for IoT devices, and also created a possibility for subscribers to obtain messages from
publisher. We offered to apply a personal computer based on the Windows operation system for a
subscriber. The scheme of the service layer is illustrated in Figure 3.</p>
      <p>MQTT Client</p>
      <p>Message Queue Telemetry Transport
(MQTT) Broker</p>
      <p>MQTT Client
Publish in:</p>
      <p>Number-plate
Subscribe to:
Number plate</p>
      <p>Publish in:</p>
      <p>Number-plate
Raspberry Pi 4 Model B</p>
      <p>Camera
OmniVision</p>
      <p>OV5647</p>
      <p>Face Mask Detection
2.2.</p>
    </sec>
    <sec id="sec-3">
      <title>Application layer</title>
      <p>
        This layer has been used to develop the back-end of the application and provide an output for an
operator to control the entrance. OpenCV, TensorFlow, Imutils, picamera and numpy libraries of
Python language were used to code the algorithm for face mask detection [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ]. For training a
model of face mask detection we have used a dataset of 5774 images, which has been divided into two
classes: mask-wearing images and do not wear masks [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Examples of those images are
demonstrated in Figure 4.
      </p>
      <p>At the first stage, the Raspberry pi camera was initialized. Its resolution was set at 500x500 and
started the video streaming process. Then started capturing frames from the Raspberry Pi camera and
constructing a blob. We have passed that blob through the network: load serialized face detector
model from disk and detect the faces. Find contours of face mask and output label with a rectangle. At
the final step, after receiving data about face mask detection, Raspberry pi transmits this data to
subscribers.</p>
      <p>The aedes broker, inject, exec, function, mqtt out, mqtt in, and debug nodes were used from the
Node Red’s menu to create the face mask detector flow. Figure 6 illustrates the flow diagram.</p>
      <p>The aedes broker (RPi) node allows user to configure the message broker for the Raspberry Pi and
specify its port. The inject node initialized the work of the flow, the camera, and launches the
TensorFlow node (computer vision algorithm), which is implemented in the Python programming
language for face mask detection [19, 20]. The results are transferred to the function node in order to
translate the text into a readable form. The mqtt out and mqtt in nodes (MQTT) publish data to the
address of subscribers. The msg node allows user to display the result.</p>
      <p>Figure 7 shows an example of displaying the face mask detection in the terminal.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Experimental Results and Discussion</title>
      <p>The debug tab of the Node Red window shows the result of received data from Picamera in Figure
9. And also the results of data transmission to publishers are shown in the MQTTBox’s window.
The average time to execute the algorithm was 2.5 seconds.</p>
      <p>
        Table 1 presents various image processing methods, platforms, resolution and execution time in
milliseconds [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
Thus, the execution time of various image processing methods on field-programmable gate arrays
(FPGAs) is actually faster than on a Raspberry Pi. However, it should be noted that the execution time
of algorithm on a Raspberry Pi is slightly inferior to the computing power of a personal computer
when its processing an image by a central processing unit.
      </p>
      <p>To measure the load on network traffic for transferring data to the message broker, we have used
the NetWorx, which is shown in Figure 10.
2048×2048</p>
      <p>4006
1024×1024</p>
      <p>28877.66
1800×1400</p>
      <p>500.958685
1024×1024
151.256079</p>
      <p>The peak value of the network traffic was approximately 11.9 kilobits per second. Thus, it can be
noted that the process of data transmission using the edge computing paradigm contributes to the
optimization of network traffic, since under the cloud paradigm, the amount of transmitted sensor data
is measured in megabits per second and gigabits per second.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Conclusion</title>
      <p>In this study, we presented an edge device based on Raspberry Pi 4 Model B with camera
OmniVision OV 5647 for face mask detection that takes the benefit of edge computing devices for
data pre-processing. The recommended solution gives low-cost computation to the IoT network edge
and also can be extended by integrating new modules and sensors. This not only decreases the
computational price but also optimizes the network traffic compared to the cloud solution. Moreover,
we have added an option for remote control through MQTT Broker.</p>
      <p>For the future research, we are going to include in the developed system a new sensor for
measuring body temperature and an algorithm that works similarly to the thermographic camera for
comparison.</p>
    </sec>
    <sec id="sec-6">
      <title>5. References</title>
      <p>[19] A. E. Kyzyrkanov, S. K. Atanov, and S. Aljawarneh, Coordination of movement of multiagent
robotic systems, in: Proceedings of the 2021 16th International Conference on Electronics
Computer and Computation, ICECCO, November 2021. doi:
10.1109/icecco53203.2021.9663796.
[20] Z. Y. Seitbattalov, S. K. Atanov, and Z. S. Moldabayeva, An Intelligent Decision Support
System for Aircraft Landing Based on the Runway Surface, in: 2021 IEEE International
Conference on Smart Information Systems and Technologies, 2021 IEEE SIST, 2021. doi:
10.1109/sist50301.2021.9466000.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F.</given-names>
            <surname>Ozyurt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mira</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Coban</surname>
          </string-name>
          ,
          <article-title>Face Mask Detection Using Lightweight Deep Learning Architecture and Raspberry Pi Hardware: An Approach to Reduce Risk of Coronavirus Spread While Entrance to Indoor Spaces</article-title>
          ,
          <source>Traitement Du Signal 39.2</source>
          (
          <year>2022</year>
          )
          <fpage>645</fpage>
          -
          <lpage>650</lpage>
          . doi:
          <volume>10</volume>
          .18280/ts.390227.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z. S.</given-names>
            <surname>Moldabayeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. Y.</given-names>
            <surname>Seitbattalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Amankeldinov</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kyzyrkanov</surname>
          </string-name>
          ,
          <article-title>Simulation of An Intelligent Detection System Virus SARS-CoV-2 in Enclosed Spaces</article-title>
          ,
          <source>in: Proceedings of the 2021 16th International Conference on Electronics Computer and Computation</source>
          , ICECCO,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/icecco53203.
          <year>2021</year>
          .
          <volume>9663840</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Meivel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sindhwani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Anand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pandey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Alnuaim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Altheneyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Jabarulla</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Lelisho</surname>
          </string-name>
          ,
          <article-title>Mask Detection and Social Distance Identification Using Internet of Things</article-title>
          and
          <string-name>
            <surname>Faster R-CNN</surname>
            <given-names>Algorithm</given-names>
          </string-name>
          ,
          <source>Computational Intelligence and Neuroscience</source>
          (
          <year>2022</year>
          )
          <article-title>2103975</article-title>
          . doi:
          <volume>10</volume>
          .1155/
          <year>2022</year>
          /2103975.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Amin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Hafeez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Touseef</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Awais</surname>
          </string-name>
          ,
          <article-title>Person Identification with Masked Face and Thumb Images under Pandemic of COVID-19</article-title>
          , in:
          <source>Proceedings of the 7th International Conference on Control, Instrumentation and Automation</source>
          ,
          <string-name>
            <surname>ICCIA</surname>
          </string-name>
          , Univ Tabriz, Fac Elect &amp; Comp Engn, Tabriz,
          <string-name>
            <surname>IRAN</surname>
          </string-name>
          ,
          <year>Feb 2021</year>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>276</lpage>
          . doi:
          <volume>10</volume>
          .1109/iccia52082.
          <year>2021</year>
          .
          <volume>9403577</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Nagrath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Madan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Arora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kataria</surname>
          </string-name>
          , and
          <string-name>
            <surname>J. Hemanth,</surname>
          </string-name>
          <article-title>SSDMNV2: A real time DNN-based face mask detection system using single shot multibox detector and MobileNetV2</article-title>
          ,
          <source>Sustainable Cities and Society</source>
          ,
          <volume>66</volume>
          (
          <year>2021</year>
          )
          <article-title>102692</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.scs.
          <year>2020</year>
          .
          <volume>102692</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Sertic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alahmar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Akilan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Javorac</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <article-title>Intelligent Real-Time Face-Mask Detection System with Hardware Acceleration for COVID-</article-title>
          19
          <string-name>
            <surname>Mitigation</surname>
          </string-name>
          , Healthcare,
          <volume>10</volume>
          .5 (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/healthcare10050873.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Shinde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Park</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>Intelligent IoT (IIoT) Device to Identifying Suspected COVID-19 Infections Using Sensor Fusion Algorithm and Real-Time Mask Detection Based on the Enhanced MobileNetV2 Model</article-title>
          , Healthcare
          <volume>10</volume>
          .3 (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/healthcare10030454.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Suganeswaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nithyavathy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Arunkumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dhileephan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ganeshan</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Antony</surname>
          </string-name>
          ,
          <article-title>Machine Learning based Mechanism for Crowd Mobilization and Control</article-title>
          ,
          <source>in: Proceedings of the 6th International Conference on Inventive Computation Technologies, ICICT</source>
          <year>2021</year>
          , pp.
          <fpage>1334</fpage>
          -
          <lpage>1339</lpage>
          . doi:
          <volume>10</volume>
          .1109/icict50816.
          <year>2021</year>
          .
          <volume>9358631</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Atanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. Y.</given-names>
            <surname>Seitbattalov</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z. S.</given-names>
            <surname>Moldabayeva</surname>
          </string-name>
          ,
          <article-title>Development an Intelligent Task Offloading System for Edge-Cloud Computing Paradigm</article-title>
          ,
          <source>in: Proceedings of the 2021 16th International Conference on Electronics Computer and Computation</source>
          ,
          <string-name>
            <surname>ICECCO</surname>
          </string-name>
          ,
          <year>November 2021</year>
          . doi:
          <volume>10</volume>
          .1109/icecco53203.
          <year>2021</year>
          .
          <volume>9663797</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Mahmud</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Toosi</surname>
          </string-name>
          ,
          <string-name>
            <surname>Con-Pi</surname>
          </string-name>
          :
          <article-title>A Distributed Container-Based Edge and Fog Computing Framework</article-title>
          ,
          <source>IEEE Internet of Things Journal 9.6</source>
          (
          <year>2022</year>
          )
          <fpage>4125</fpage>
          -
          <lpage>4138</lpage>
          . doi:
          <volume>10</volume>
          .1109/jiot.
          <year>2021</year>
          .
          <volume>3103053</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
            <surname>Gizinski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <article-title>Design, Implementation and Performance of an Edge Computing Prototype Using Raspberry Pi</article-title>
          ,
          <source>in: Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference</source>
          , CCWC,
          <year>2022</year>
          , pp.
          <fpage>592</fpage>
          -
          <lpage>601</lpage>
          . doi:
          <volume>10</volume>
          .1109/ccwc54503.
          <year>2022</year>
          .
          <volume>9720848</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Hawthorne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kapralos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. W.</given-names>
            <surname>Blaine</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Matthews</surname>
          </string-name>
          ,
          <article-title>Evaluating Cryptographic Performance of Raspberry Pi Clusters</article-title>
          ,
          <source>in: Proceedings of the IEEE High Performance Extreme Computing Conference</source>
          , HPEC,
          <year>Sep 2020</year>
          . doi:
          <volume>10</volume>
          .1109/HPEC43674.
          <year>2020</year>
          .
          <volume>9286247</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Rathour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Khanam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gehlot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rashid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>AlGhamdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Alshamrani</surname>
          </string-name>
          ,
          <article-title>Real-Time Facial Emotion Recognition Framework for Employees of Organizations Using Raspberry-Pi,</article-title>
          <source>Applied Sciences-Basel</source>
          <volume>11</volume>
          .22 (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .3390/app112210540.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Yar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Imran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sajjad</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Kastrati</surname>
          </string-name>
          ,
          <string-name>
            <surname>Towards Smart Home Automation Using IoT-Enabled Edge-Computing</surname>
            <given-names>Paradigm</given-names>
          </string-name>
          ,
          <source>Sensors</source>
          <volume>21</volume>
          .14 (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .3390/s21144932.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Brimzhanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Atanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khuralay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Kobelekov</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. G.</given-names>
            <surname>Gagarina</surname>
          </string-name>
          ,
          <article-title>Crossplatform compilation of programming language Golang for Raspberry Pi</article-title>
          ,
          <source>in: Proceedings of the 5th International Conference on Engineering and MIS</source>
          , ICEMIS
          <year>2019</year>
          , vol.
          <volume>10</volume>
          ,
          <year>June 2019</year>
          . doi:
          <volume>10</volume>
          .1145/3330431.3330441.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Z. Y.</given-names>
            <surname>Seitbattalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Canbolat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. S.</given-names>
            <surname>Moldabayeva</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kyzyrkanov</surname>
          </string-name>
          ,
          <article-title>An Intelligent Automatic Number Plate Recognition System Based on Computer Vision</article-title>
          and Edge Computing,
          <source>in: Proceedings of the 2022 IEEE International Conference on Smart Information Systems and Technologies</source>
          , 2022 IEEE SIST,
          <year>April 2022</year>
          . To appear.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Arslan</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Canbolat</surname>
          </string-name>
          ,
          <article-title>Performance of Deep Neural Networks in Audio Surveillance</article-title>
          ,
          <source>in: 2018 6th International Conference on Control Engineering &amp; Information Technology, CEIT</source>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1109/ceit.
          <year>2018</year>
          .
          <volume>8751822</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>D. O.</given-names>
            <surname>Toybazarov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Atanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. R.</given-names>
            <surname>Burnayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. N.</given-names>
            <surname>Baiseitov</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. D.</given-names>
            <surname>Kassenov</surname>
          </string-name>
          ,
          <source>Modeling and Cluster Analysis of Antagonistic Systems, in: Proceedings of the 2021 16th International Conference on Electronics Computer and Computation</source>
          ,
          <string-name>
            <surname>ICECCO</surname>
          </string-name>
          ,
          <year>November 2021</year>
          . doi:
          <volume>10</volume>
          .1109/icecco53203.
          <year>2021</year>
          .
          <volume>9663751</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>