tures. Signal, Image and Video Processing. Springer,
18:369–378.
Forbes, E. (2017). Executors and pools. In Learning Con-
currency in Python, pages 159–188. Packt.
Geitgey, A. (2020). face recognition pack-
age. Available online at: https://face-
recognition.readthedocs.io/en/latest/face recognition.html.
Houghtaling, M. A., Fiorini, S. R., Fabiano, N., Goncalves,
P. J. S., Ulgen, O., Haidegger, T., Carbonera, J. L.,
Olszewska, J. I., Page, B., Murahwi, Z., and Prestes,
E. (2024). Standardizing an ontology for ethically
aligned robotic and autonomous systems. IEEE Trans-
actions on Systems, Man, and Cybernetics: Systems,
54(3):1791–1804.
IBM (2024). What is edge computing? Available online at:
http://www.ibm.com/topics/edge-computing .
Khan, L. U., Yaqoob, I., Tran, N. H., Kazmi, S.
M. A., Dang, T. N., and Hong, C. S. (2020).
Edge-computing-enabled smart cities: A compre-
hensive survey. IEEE Internet of Things Journal,
7(10):10200–10232.
Lea, P. (2020). IoT and Edge Computing for Architects. 2nd
ed. Packt.
Li, Y., Xiao, Y., Gong, Y., Zhang, R., Huo, Y., and Wu, Y.
(2024). Explainable AI: A way to achieve trustworthy
AI. In Proceedings of the IEEE International Confer-
ence on Big Data Security on Cloud, pages 150–155.
Microsoft (2024). .NET documentation. Available online
at: https://docs.microsoft.com/en-gb/dotnet/.
Mishra, A. K., Reddy, R. R., Tyagi, A. K., and Arowolo,
M. O. (2024). Artificial intelligence-enabled edge
computing: Necessity of next generation future com-
puting system. In IoT Edge Intelligence, page 67–109.
Springer.
Naveen, S. and Kounte, M. R. (2019). Key technologies and
challenges in IoT edge computing. In Proceedings of
the IEEE International Conference on IoT in Social,
Mobile, Analytics and Cloud, pages 61–65.
Otemuyiwa, P. (2017). Brute Forcing HS256 is
Possible: The Importance of Using Strong
Keys in Signing JWTs. Available online at:
https://auth0.com/blog/brute-forcing-hs256-is-
possible-the-importance-of-using-strong-keys-to-
sign-jwts/.
Perwaiz, N., Fraz, M. M., and Shahzad, M. (2024). Smart
surveillance with simultaneous person detection and
re-identification. Multimedia Tools and Applications.
Springer, 83:15461–15482.
Quincozes, V. E., Quincozes, S. E., Kazienko, J. F., Gama,
S., Cheikhrouhou, O., and Koubaa, A. (2024). A
survey on IoT application layer protocols, security
challenges, and the role of explainable AI in IoT
(XAIoT). International Journal of Information Secu-
rity, 23:1975–2002.
RedHat (2020). What is a REST API? Available on-
line at: https://www.redhat.com/en/topics/api/what-
is-a-rest-api.
Rostum, H. M. and Vasarhelyi, J. (2024). Comparing the
effectiveness and performance of image processing al-
gorithms in face recognition. In Proceedings of the
IEEE International Carpathian Control Conference,
pages 1–5.
Sharma, H. and Kanwal, N. (2024a). Smart surveillance
using IoT: A review. Radioelectronic and Computer
Systems, 109(1):116–126.
Sharma, H. and Kanwal, N. (2024b). Video surveillance
in smart cities: Current status, challenges and fu-
ture directions. Multimedia Tools and Applications.
Springer, pages 1–46.
Shi, W., Cao, J., Zhang, Q., Li, Y., and Xu, L. (2016). Edge
computing: Vision and challenges. IEEE Internet of
Things Journal, 3(5):637–646.
Siemens (2023). TinyDB. Available online at:
https://github.com/msiemens/tinydb.
Slee, D., Cain, S., Vichare, P., and Olszewska, J. I. (2021).
Smart lifts: An ontological perspective. In Proceed-
ings of the International Joint Conference on Knowl-
edge Discovery, Knowledge Engineering and Knowl-
edge Management (KEOD), pages 210–219.
Sodiya, E. O., Umoga, U. J., Obaigbena, A., Jacks, B. S.,
Ugwuanyi, E. D., Daraojimba, A. I., and Lottu, O. A.
(2024). Current state and prospects of edge comput-
ing within the Internet of Things (IoT) ecosystem. In-
ternational Journal of Science and Research Archive,
11(1):1863–1873.
Thales (2020). Facial recognition:
top 7 trends. Available online at:
https://www.thalesgroup.com/en/markets/digital-
identity-and-security/government/biometrics/facial-
recognition .
Utimaco (2024). What is Smart Security?. Available
online at: https://utimaco.com/service/knowledge-
base/emergency-communications-and-public-
warnings/what-smart-security.
Van Noorden, R. (2020). The ethical questions that haunt
facial-recognition research. Nature, 587:354–358.
Visionplatform (2024). What is edge computing for
computer vision and what are the benefits?. Available
online at: https://visionplatform.ai/what-is-edge-
computing-for-computer-vision-and-what-are-the-
benefits/ .
Wheeler, D. and Olszewska, J. I. (2022). Cross-platform
mobile application development for smart services. In
Proceedings of the IEEE International Symposium on
Computational Intelligence, pages 203–208.
Wood, R. and Olszewska, J. I. (2012). Lighting-variable
AdaBoost based-on system for robust face detection.
In Proceedings of the International Conference on
Bio-Inspired Systems and Signal Processing, pages
494–497.
Xiao, Y., Huo, Y., Cai, J., Gong, Y., Liang, W., and
Kolodziej, J. (2024). ERF-XGB: An Edge-IoT-based
explainable model for predictive maintenance. IEEE
Transactions on Consumer Electronics, 70(1):4016–
4025.
Zhu, Y., Al-Ahmed, S. A., Shakir, M. Z., and Olszewska,
J. I. (2023). LSTM-based IoT-enabled CO2 steady-
state forecasting for indoor air quality monitoring.
Electronics, 12(1):1–12.
EXPLAINS 2024 - 1st International Conference on Explainable AI for Neural and Symbolic Methods
154