IoT and Blockchain-Based Mask Surveillance System for COVID-19 Prevention Using Deep Learning
2022-08-24WahidurRahmanNaifAlMudawiAbdulwahabAlazebMuhammadMinoarHossainSaimaSiddiqueTashfiaMdTarequlIslamShisirMiaandMohammadMotiurRahman
Wahidur Rahman, Naif Al Mudawi, Abdulwahab Alazeb, Muhammad Minoar Hossain,Saima Siddique Tashfia, Md.Tarequl Islam, Shisir Miaand Mohammad Motiur Rahman
1Department of Computer Science and Engineering, Mawlana Bhashani Science and Technology University, Tangail,Bangladesh
2Department of Computer Science, Najran University, Najran, 55461, Saudi Arabia
Abstract: On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide.Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate.Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes,and offices needs to be enforced.This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain.The absence or displacement of the mask will be identified with a raspberry pi,a camera module, and the operations of DL and Machine Learning (ML).The detected information will be sent to the cloud server with the mechanism of IoT for real-time data monitoring.The proposed model also includes a Blockchain-based architecture to secure the transactions of mask detection and create efficient data security,monitoring, and storage from intruders.This research further includes an IoT-based mask detection scheme with signal bulbs, alarms, and notifications in the smartphone.To find the efficacy of the proposed method, a set of experiments has been enumerated and interpreted.This research work finds the highest accuracy of 99.95% in the detection and classification of facial masks.Some related experiments with IoT and Block-chain-based integration have also been performed and calculated the corresponding experimental data accordingly.A System Usability Scale (SUS)has been accomplished to check the satisfaction level of use and found the SUS score of 77%.Further, a comparison among existing solutions on three emergenttechnologies is included to track the significance of the proposed scheme.However, the proposed system can be an efficient mask surveillance system for COVID-19 and workable in real-time mask detection and classification.
Keywords: Internet of things (IoT); blockchain; deep learning; feature reduction; surveillance system
1 Introduction
The Severe Acute Respiratory Syndrome Coronavirus 2(SARS-CoV-2) is the newly arisen infectious disease that originated in Wuhan, China, in December 2019 [1].Around 170 people are reported as dead, and 7, 711 people were infected by the novel coronavirus in China before declared as a global pandemic.The rapidly spreading of the COVID-19 [2] disease has vastly impacted every aspect of society.Recently, the economic and health sectors have been paralyzed by the massive transmitting of the virus.World Health Organization (WHO) reported that as of July 9, 2021, at this moment in time,around 186,596,118 people had been affected, and over 4,030,961 people have been dead worldwide.Recent evidence suggests that the virus transmits mainly between people in close interaction, where the distance between them is less than 1m [3].Respiratory droplets or aerosols containing the virus contaminate people who are in close contact.The virus is inhaled directly into interaction with the nose, mouth, and eyes.There is no antiviral medicine to prevent this disease.Nowadays, clinically approved vaccines can’t prevent infections too.Society has encountered complications for human health, the environment, and economic losses.To prevent infection is the key way to protect from the disease, WHO recommended that people should maintain a social distance of at least 2m [2] and wear face masks appropriately to avoid virus transmission.The world has announced no masks, no service policy [4].Many service providers also ensure face masks beforehand to enter their premises.Protectivemasks lower the probability of viruses transmitting to the human respiratory system through infected people’s droplets.According to report analysis, if 50% of people wear face masks, only 50% of the population would be attacked by the virus [5].One of the challenges to using masks in society is the people’s health condition and the limit of authorities’ personnel which reflect lessmonitoring of masks usage.So, there are several methods that some people wear a face mask in different covering positions.The study debated and found that the COVID-19 has increased spread thrown droplets or through the air for more than three hours active.Once 80% of the people wear face masks, the outbreak can be stopped noticeably.However, people would become careless and complacent to wear a face mask,and sometimes they do not wear masks properly, not covering both nose and mouth.Therefore, on the one hand, the detection of face masks is so important, identification of face mask displacement is more significant on the other hand to avoid virus transmission to others.Many of the papers proposed face mask detection approaches.But, this paper presents an approach to prevent the coronavirus from spreading by detecting mask displacement in public areas.
This research adopts a combination of Deep Learning (DL) with Machine Learning (ML) [6,7]Internet of things (IoT) and Blockchain-based system to detect the absence and displacement of a mask to make a way of prevention of COVID-19 especially in the shopping mall, hotels, restaurants,homes, and offices.The DL-based architecture has been utilized by Convolutional Neural Network(CNN).Thus, the contributions of this research work are described as follows:
•The real-time video surveillance will monitor the individuals in public places and detect whether a person is wearing a face mask appropriately or not by using DL with CNN.This operation will be performed with a raspberry and camera module and stored the detected information to work with IoT and Blockchain-based operations.
•After detecting the absence or displacement of the facial mask, the system will transmit the spotted information to the IoT cloud for real-time data monitoring, and analog operations like alarm and notification will occur.
•To ensure an efficient transaction of detected results from IoT devices end to Cloud server,a Blockchain and Software-Defined Networking (SDN) based architecture will optimize the security, safety, and integrity of the proposed solution.
The manuscript is organized into five interconnected sections.In Section 2, the background of the previous study is presented.Section 3 provides the overall proposed methodology and working principles.Section 4 depicts the results of our proposed solution along with relevant discussion.Finally, Section 5 illustrates the conclusion of this manuscript with drawbacks and future works.
2 Related Works
This section will discuss the previous study related to our proposed integration with their research gaps.The section is identically classified into two associated parts.First, the related work in mask detection with deep learning and the Internet of Things (IoT) will be presented.The second part will illustrate the related study of COVID-19 and Blockchain.Many great contributors have placed a significant trace in the field of COVID-19 and mask detection with deep learning, IoT, and Blockchain.
2.1 Mask Detection with Deep Learning Along with IoT
The authors of the paper [8] approached a system to monitor people in public whether they are wearing face masks or not.MobileNet and OpenCV were employed as the backbone of their real-time automatic face mask identification system, with Tensorflow and Keras used to train the model.After detecting any personnot wearinga mask,the system will capture the person’simage and send it to that person and the higher authorities.For advanced detection of face masks, the article [9] discussed using two object detection models, YOLOv3 and faster R-CNN.The authors compared the performance of both the models; i.e., the average precision of YOLOv3 was 55, and Faster R-CNN was 62, whether the inference time was 0.045s and 0.15s, respectively.The authors concluded by stating that both models are reasonably accurate.However, it would be prudent to utilize the model with the YOLOv3 algorithm when applying these models to real-world surveillance cameras because it does single-shot detection and has a considerably shorter inference time than Faster-RCNN.
TThe research [10] developed an IoT-based multi-features Smart Screening and Disinfection Walkthrough Gate (SSDWG) to screen a large number of people at once rapidly.The SSDWG included two primary modules: the firstwas for disinfecting and measuring the temperature of humans in a noncontact environment using theMLX90614, and the second was for detecting the presence of a person and activating the disinfection spray system using ultrasonic and motion sensors.Using VGG-16, MobileNetV2, Inception v3, ResNet-50, and CNN, the second module used a transfer learning strategy to detect face masks in real-time scenarios and classify persons who wore them properly improperly, ornot at all.Using the VGG-16, MobileNetV2, Inception V3, ResNet-50, and CNN, the mask detection and classification module achieved accuracies of 99.81%, 99.6%, 99.46%, 99.22%, and 99.07% for face mask detection and classification in three classes, respectively (FWPM, FWIPM, and FWOM).The authors also classed face masks into two groups (N-95 and Surgical) and used the VGG-16 and MobileNetV2 models to obtain 98.17% and 97.37% accuracy, correspondingly.
The paper [11] had utilized deep, and traditional machine learning suggested a hybrid model for face mask detection.Resnet50 was used for feature extraction, while the authors used decision trees,Support Vector Machine (SVM), and ensemble algorithm for the classification process.The Three face mask datasets which had been selected were the Real-World Masked Face Dataset (RMFD), the Simulated Masked Face Dataset (SMFD), and the Labeled Faces in the Wild (LFW).In RMFD, the SVM classifier achieved 99.64 percent testing accuracy, 99.49 percent in SMFD, and 100 percent in LFW.In this pandemic condition, several image classification and object identification techniques have emerged to achieve great accuracy in the detection of face masks.
The authors of the paper [12] approached a model named SSDMNV2, which used Single Shot Multibox Detector as a face detector and MobilenetV2 architecture as a framework for the classifier to perform real-time mask detection.The proposed model was created with OpenCV Deep Neural Network (DNN), Tensorflow, and Keras, and yielded positive results.This model had an F1 score of 0.93 and an accuracy score of 0.9264.An AI-based smart device consisted of Raspberry Pi and AI model with a camera proposed in the paper [13] to detect whether a person is wearing a mask or not and send an alert message via an integrated mobile app.If no one is present at home, this mobile app identifies if anyone enters the house.The authors used the CNN model with Tensorflow to identify face masks.
The paper [14] presented a new application that classifies people based on their mask-wearing using an autonomous Drone.The data were trained using TensorFlow, OpenCV, and Keras, and the classification was based on the MobileNetV2 architecture.The IoT-controlled autonomous Drone is in charge of closely monitoring and facilitating the movement of people from afar.The authors of the paper [15] used two deep CNN architectures and one CNN-based MobilenetV2 architecture to detect face masks, including Max pooling and Average pooling.Max pooling has a training accuracy of 96.49% and a validation accuracy of 98.67%.On the other hand, average pooling obtained 95.19%training accuracy and 96.23% validation accuracy.The MobileNetV2 architecture has the highest training and validation accuracy, 99.72% and 99.82%, respectively.
Tab.1 shows the corresponding summary of the literature review.In these papers, the authors only focused on mask detection with two classes: mask & non-mask with deep learning mechanisms.Some authors had adopted IoT besides deep learning to detect and classify masks.But no competitive solution has yet been proposed with the highest accuracy of detection with raspberry pi and classification in three classes: mask, non-mask, and mask displacement or mismatch.Also, a combination of three emergent technologies like Deep Learning, Internet of things (IoT), and Block-chain has not been adopted in a mask surveillance system for COVID-19 prevention.
Table 1: Summary of the literature review on mask detection with deep learning along with IoT
Table 1: Continued
2.2 COVID-19 and Blockchain
In paper [16], Sharma et al.created a Blockchain-based solution to deal with the global pandemic.The authors had also discovered and explained nine crucial applications of Blockchain in combating the COVID-19 pandemic threat.
In the paper [17], some creative approaches are being used to tackle the issues brought on by the COVID-19 situation by applying Blockchain.The author offered real-world examples of how Blockchain can be used in the supply chain, finance, healthcare, identifying people, securing credentials, tracing connections, identity management, and data analysis.
The fundamental problems that evolved during the COVID-19 pandemic are discussed in the first part of this paper [18].After that, the authors investigated whether or not Blockchain can be an essential emergent technology by examining future use cases.Additionally, the authors outline how Blockchain can be applied for each use case and overview how the technology will function.
Xu et al.in paper [19] proposed a Blockchain-based privacy-preserving contact tracing technique for COVID-19 known as BeepTrace.In this work, the authors had revealed that the users need to be isolated from their personal information like home address when using the platform, utilizing Blockchain bridging.The authors also claimed their method had proved improved security and privacy and the advantages of being battery friendly and available to everyone on the Internet.
An exploratory framework has been developed in paper [20] by employing Blockchain as a structure and applying several peer-to-peer, time stamping, and de-centralized storage advantages of Blockchain to examine the feasibility of building a new system to identify and validate unknown incidences of COVID-19 virus.The framework’s design will also allow citizens to forecast the risk of COVID-19 disease mainly in the urban areas via a unique P2P-Mobile Application.The authors also claimed that the plan would result in an effective system capable of supporting governments, public health organizations, and people in the decision-making process concerning the detection, prediction,and prevention of infection of COVID-19 disease.
In the study of these, the authors had only adopted the Blockchain technology for privacypreserving, secured tracing connections, and identity management for the people stuck in the home during theCOVID-19 pandemic.But no architectural model of Blockchain has been proposed to work with the mask surveillance system.
3 Methodology and Working Principle
This methodology of the proposed model is classified into four interconnected phases.In the first phase, the system will capture the face of the individuals.For this purpose, a camera module will capture the face with accurate focusing.After that, the captured information will send to the raspberry pi.The scheme will perform detection and live to monitor in the second phase.In this scheme, images will be taken from the cameramodule, and then the deep learning-based automatic operation is applied to classify facemask status.The detected information will be sent to the cloud for real-time monitoring if the internet connection is available.
In the third phase, a Blockchain-based intelligent monitoring system has been presented to track the secure transaction of detected information from raspberry pi to the IoT could server.Finally, in the fourth phase, an analog operation is performed at the last stage to ensure a complete IoT-enabled system.The operation includes a wireless connection such as Bluetooth with another microcontroller to provide analog notifications to the corresponding users.The phase will also provide an alarm and switch on a signal bulb after detecting the information from 2ndphase.The system will further provide notification and vibration in the smartphone via Bluetooth.Fig.1 shows the corresponding overall system illustration.
The proposed system utilized a deep learning pipeline to automatically detect masks from the captured images in real-time.Fig.2 depicts the required pipeline for this purpose.
According to Fig.2, a training dataset is utilized to enlighten the formation of the mask displacement technique.The training dataset holds three types of images of human faces- (1) Wearing nomask,(2)Wearingthemask,and(3)wearing the mask in thewrongway.Each image of the dataset is resizedinto224×224×3.Apre-trained ResNet-50 CNN[21]model is used by excluding the classifier part to extract the features from each image.In ResNet-50, there exist a total of 50-layer and it consists of 26 million parameters.ResNet-50 joins the input of the Nth layer to the (N + n)thlayer; thus, it constructs a deep architecture that uses skip connection to generate information over layers.Fig.3 presents the general architecture of ResNet-50; like CNN, it consists of convolutional, pooling, fully connected, and other layers associated with a deep network.From ResNet-50, we have gained 2048 features for each image.
Figure 1: Overall system illustration
Figure 2: Automatic mask surveillance detection pipeline from deep learning
Figure 3: Structure of ResNet-50
Including one class value with features, the feature vector has a total of 2049 values for each image.The features of the feature vector are optimized by using two techniques, namely Principal component analysis (PCA) and Linear discriminant analysis (LDA).PCA reserves correlated features by eliminating uncorrelated features.To eliminate uncorrelated features, PCA gets the covariance between features by using the following equation [22]:
LDA is a supervised linear dimensionality reduction technique that finds feature subspace and optimizes class separability.It performs separation by computing linear discriminants that enhance multiple access separability.Mathematically for each class, we can calculate the within-class variance as follows [23]:
To build the ML model, this research uses several classifiers, namely Logistic regression (LR) [24],Support vector machine (SVM) [25], and Random Forest (RF) [26].
To classify data points, LR first sets a weight matrix by a random initialization, and then each feature is multiplied with the weight using the Eq.(3).After finding‘a’is passed to Eq.(4), and it is followed for finding cost using (5) for the purpose of iteration, during which weight is updated by using Eqs.(6) and (7).Thus, after completing the training, the model can test new data to predict the unknown classes.
SVM turns lower-dimensional data to higher dimensions using a certain kernel function K (x,x’) and then, using complex iterative approaches, separates the data through a certain hyperplane for classification.Eq.(8) shows the general form of a hyperplane, and Eq.(9) presents the sigmoid function used as SVM kernel in this research.
RF is a Decision tree (DT) classifier-based bagging ensemble model.Formally predictor RF is defined by Eq.(10) which indicates RF formed by a group of DT base trees.In Eq.(10)Θiis the output associated with random variable Θ
Each of the classifiers described above is examined with three feature sets- Original feature set,PCA optimized feature set, and LDA optimized feature set.Based on all analyses, we have observed that the performance of PCA with LR outperforms all processes.Hence LR with PCA is used to build the main model in this research.The selection process of the best model is summarized in Fig.4.
It has to be noted that for LDA and PCA, we have stored a total of 50 components during feature reduction.The utilization of the feature reduction process during model selection is shown in Fig.5.
3.1 Safe Monitoring of Cloud Data with Blockchain
This section illustrates how Blockchain technology will secure the transaction of data from the sender end devices to the end-users.In Fig.6, the proposed architecture of Blockchain has been depicted.In this figure, the proposed model is enriched with five essential elements of Blockchain.Firstly, authentication is responsible for the data authentication retrieved from the IoT devices such as raspberry pi.Secondly, immutability represents the unchanged ability of the data retired from the sender station of the IoT devices [27].Thus, the intruders will not be able to break down the avail pattern of the data.Thirdly, decentralization & distribution are some of the most outstanding features of Blockchain.No transaction has yet occurred in a centralized form with these features, such as individuals, groups, or organizations, especially in IoT-based data transactions.These will also ensure data transfer control and make a transaction in a distributed manner.Finally, tokenization includes some form of entity that can be stored and removed to confirm the transaction from the sender station[28,29].To work with data storage and management, this research also places a way of database management system in the cloud for interactively real-time data monitoring and storage.
Figure 4: Model selection approach of the mask displacement system
Figure 5: Mechanism of feature reduction for this system
Figure 6: Proposed blockchain-enabled cloud security system
Fig.7 shows a block diagram of the layered based architecture of the proposed Blockchainbased scheme [30].In this figure, the proposed model will utilize a Soft-ware-Defined Networking(SDN) [31] based switch system to work with multiple IoT devices.Suppose a large number of detected information is available in the perception layer.In that case, the system will use an SDN switch to immediately create a gateway with the respective servers in the Edge layer.In this layer,the Blockchain-based operations have been carried to secure available transactions and control the ambiguous transmission of data.After the proper operations and the utilization, the processed data is transmitted to the cloud layer for real-time monitoring at the user end devices and ensuring a proper mask surveillance system.
Figure 7: The layered based architecture of the proposed blockchain system
3.2 IoT Based Operation on Mask Displacement
This section presents howthemask displacement will be performed with IoT, besides deep learning techniques.Fig.8 shows the corresponding diagram of the proposed mask monitoring system with IoT.In this figure, the camera module is responsible for scanning the facial mask in a public place.The camera module is connected with rasp-berry pi as a microprocessor.When the system finds the decision on the facialmask fromthe raspberry, the scheme immediately sends the command to another micro-controller attached with raspberry pi to create some analog response like generic alarms and smartphone notifications via a Bluetooth connection.The model also includes three bulbs to produce light signals.In this way, the green bulb will be switched ON if the scheme finds the facial mask in the appropriate position, the blue blub will be ON for mask displacement or mismatch, and the red bulb will be ON if the system cannot detect any mask in the face.These operations will only happen if a Bluetooth connection is available between the raspberry and micro-controller.Again, the model includes a way of real-time data monitoring and storage with the cloud via a reliable internet connection.In case of internet connection failure, no data is transmitted from the raspberry pi to the cloud server.
4 Results and Discussion
This section will present the current research work results and relevant discussion.Initially,the section provides the experimental data analysis with deep learning for mask detection and classification.Then the section depicts the experiments with Raspberry Pi and camera module along with analog configuration.After that, the section will include a System Usability Scale (SUS) on some randomly selected individuals about our proposed scheme and interpret the calculated data accordingly.At last, the section will give a comparison among existing solutions with our proposed system.
Figure 8: A block diagram of IoT-based mask monitoring
4.1 Experimental Data Analysis with Deep Learning
There exist three classes in our dataset, namely- mask, no-mask, and mismatch,where mask means a person wearing a mask in the right way, No-mask means a person wearing no mask, and Mismatch means a person wearing the mask in the wrong way.For the first two classes- mask and no-mask we have adopted the images from [32].The no-mask class in [32] holds 123 number mismatch images;hence, we extracted these images and added them to the mismatch class.To fulfill the mismatch class,we collected our images from various sources; thus, the 123 images mismatch class has 3563 images.Therefore, the final dataset has a total of 10885 images.Among them, 3599, 3723, and 3563 images belong to mask, no-mask, and mismatch class, respectively.To build up and examine our system, we partitioned the dataset into two fixed halves, the first 80% for the training stage and the rest 20% for the testing stage.
The confusionmatrix (CM) presents the capability of any classification techniques by representing the right and wrong detection by the system [33].Tab.2 shows the CM of our Mask displacement detection system.
Tab.3 presents the CM as well as the overall accuracy of this scheme when we have performed feature reduction using PCA.From Tab.3, it is noticed that the peak accuracy of the system with PCA is obtained when we have used LR for classification.
Tab.4 presents the CM as well as the overall accuracy of this scheme when we have performed feature reduction using LDA.From Tab.4, it is noticed that the peak accuracy of the system with LDA is obtained when we have used LR for classification.
Table 2: Illustration of CM for this scheme
Table 3: Performance of proposed method due to PCA
Tab.5 presents the CM and the overall accuracy of this scheme when we have classification without feature reduction.From Tab.5, it is noticed that the peak accuracy of the system without feature reduction is obtained when we have used LR for classification.
Table 4: Performance of proposed method due to LDA
Table 5: Performance of proposed method without feature reduction
Fig.9 shows the comparison of the misdetection rate of different classifiers for several methods used in our scheme.By analyzing this figure, it is noticed that the lowestmisdetection rate of the system is obtained by using PCA with LR and which is 0.05%, and this is the actual outcome of this system.Therefore, the highest accuracy of our scheme is 99.95%.
The maximal accuracy of this research, along with LDA and PCA, is gained by using the LR classifier.In this research, we have utilized 50 components for each feature re-duction approach.Fig.10 shows the performance of PCA and LDA concerning the different numbers of components by using the LR classifier.
This research has also analyzed two other CNN techniques - AlexNet and Inception v3 on our mentioned dataset.Fig.11 shows the comparison between these two models and the proposed approach for the model of achieving the best accuracy.
Figure 9: Performance of different classifiers concerning various feature processing approaches
Figure 10: Performance of feature reduction techniques concerning various components
Figure 11: Performance of different CNN techniques on the mentioned dataset
4.2 Experiments with IoT Based Integration
This work has accomplished some experiments with IoT-based embedded systems with the raspberry pi and camera module.The outcomes of the experiment were analog.To perform this experiment, ten samples’data have been calculated for mask detection and classification with IoTbased integration.In this experiment, Bluetooth and internet connection have played a significant role in creating an analog response and cloud data transmission.This experiment finds the average delay time of 1.4 s to transfer data from raspberry to IoT cloud server aftermask detection and classification.Tab.6 shows the experimental data with IoT-based models, and Fig.12 illustrates a line chart diagram of cloud data transmission delay.This figure clearly remarks that the unavailability of the internet connection results in null transmission of data from raspberry pi to IoT cloud server.
Table 6: Experimental data analysis with IoT-based system
Figure 12: Line chart of cloud data transmission delay
4.3 Experimental Data with Blockchain
Due to set up the environment to work with Blockchain-based integration.This model has occupied Emulator Mininet-Wifi,Ganache,and Visual Studio Code to build the required environment for the simulation.This research also used Ubuntu (Linux) and Raspbian as Operating System (OS)with Core (TM)-i7 processor, 2.20 GHz CPU, 8GB RAM 1 SSD ROM, and other external memory.The experimental setup for Blockchain has been accomplished with Solidity language along with JavaScript.In the initial experiment, the model has created smart contracts for transmitting data from one block to another.While initializing the transaction, the proposed has hashed the current address to transform a smart contract with the amount of gas consumption from the local Ethereum can control the number of transactions in the cloud with the corresponding smart contracts.Tab.7 shows the related experimental data analysis with Blockchain from an address of an IoT device such as‘0x7b39D5FBCbAD9f3A1230245c0c671Fc5348795eD’.Again, Fig.13 shows the amount Gas consumption per transaction in Ethereum based Blockchain system for IoT Data transactions.
Table 7: Experimental data analysis with blockchain-based IoT data transaction to the cloud
Figure 13: Mined vs. amount of gas consumption for blockchain transaction
4.4 System Usability Scale (SUS)
This research work has performed a System Usability Scale (SUS) on twelve randomly selected individuals about this proposed orientation.To accomplish this experiment, the proposed model has been provided and requested to comment on their experience for testing and prediction.SUS score shows that around 77% of persons marked the proposed solution reliable for interactivemask detection and classification.Approximately 17% did not give any constructive feedback, and the rest of the 16% people doubted our proposed solution.The corresponding results of the experiment have been interpreted in Fig.14.
4.5 Comparison among the Existing Solutions
Tab.8 presents the comparison among existing methods and proposed methods based on several parameters.From the investigation of our related work section, we have taken the most compatible works for comparison.From Tab.8, it is noticeable that the proposed architecture holds several novels and improved techniques in this research field.
Figure 14: Pie chart of system usability scale (SUS)
Table 8: Comparison among proposed method and existing methods
From the analysis of Tab.8,we have found that most authors try to establish their model to capture whether a person can wear a mask or not.Still, the authors of the paper [10] have also tried to detect whether a person wears themask in the wrong way, which we have also tried in our work.Hence Fig.15 shows the comparison between the paper Hussain et al.and the proposed scheme.
Figure 15: Comparison among proposed scheme and paper [10]
5 Conclusion and Future Work
SARS-CoV-2 (Severe Acute Respiratory Syndrome Coronavirus 2) was discovered in China at the end of 2019 and has since spread over the world.Every day the death rate touches its highest peak,and the socio-economical balance of the country to country has been damaged due to COVID-19.According to the medical expert’s opinion, wearing a facial can be a possible solution to fight against the destructive unseen enemy.Thus, the paper reflects on the embodiment of a scheme with the help of Deep Learning (DL), the Internet of things (IoT), and Blockchain.The proposed model includes a raspberry pi, a camera module, and Convolutional Neural Networks (CNN) based architecture to detect and classify masks in public places and send the detected results to the cloud for real-time data monitoring with IoT.This model also includes a Blockchain architecture model for moving discovered data from the microprocessor to the cloud to assure dependability, safety, and security.The proposed model further includes an IoT-based architecture to create an analog response like alarm and notification upon mask detection and classification.This also presents experimental data of the proposed solution, such as data analysis with deep learning models, testing with IoT-based architecture,a System Usability Scale(SUS),and an identical comparison among the existing solutions with our proposed system.This study finds the highest accuracy of 99.95% in mask detection and classification.Also, the proposed combined solution tracks out the SUS score of 77%.While working with the proposed solution, several drawbacks have been noticed.Firstly, the system can only detect a single person with a facemask.Though the CNN-based architecture can classify and detect masks,IoT-based orientation becomes unable to respond to multiple detected information at a time.This happens when the model is established on the IoT devices like the raspberrypi.The raspberryhas little memory and less computational space than the generic personal computer.Secondly, the proposed model becomes unavailable when multiple cameras have been attached with raspberry pi.Thirdly,the data was moderate to work such a global issue.Finally, the integration of the Blockchain in the conceptual stages, no real-life implementation has yet been performed.In the future, the drawbacks found this research will be resolved, and a complete package of amask surveillance system forCOVID-19 prevention will be presented with the real-time of three emergent technologies such DL, IoT, and Blockchain.However, the researchwork in this manuscript can be adjustable in real-lifemask detection and classification.
Funding Statement:The authors received no specific funding for this study.
Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.
杂志排行
Computers Materials&Continua的其它文章
- Constructing Collective Signature Schemes Using Problem of Finding Roots Modulo
- Modeling and Simulation of Two Axes Gimbal Using Fuzzy Control
- Artificial Monitoring of Eccentric Synchronous Reluctance Motors Using Neural Networks
- An Optimal Scheme for WSN Based on Compressed Sensing
- Triple-Band Metamaterial Inspired Antenna for Future Terahertz (THz)Applications
- Adaptive Multi-Cost Routing Protocol to Enhance Lifetime for Wireless Body Area Network