Affiliation:
1. B. M. S. College of Engineering, Bengaluru, India
Abstract
Due to the random occurrences of street waste, city managers usually spend a lot of energy and money cleaning street garbage, which is a core duty in computer vision, with applications ranging across the process of smart city creation. Deep network solutions are frequently constrained by the amount of training data available as they become deeper and more complicated. With this in mind, Open CV or Google AI has made the Open Images dataset publicly available in order to drive breakthroughs in image analysis and interpretation. Open Images continues the legacy of PASCAL VOC, Image Net, and COCO, but on a much larger scale. As a result, visual street cleanliness assessment will be extremely vital in this project. Existing assessment methods, on the other hand, have several significant drawbacks, such as the lack of automation in the collecting of street waste data and the lack of real-time street cleanliness data. Finally, the findings are fed into a framework for calculating street cleanliness, which allows for the visualisation of street cleanliness. Cleanliness levels are maintained at a high level, making it easier for city managers to schedule clean-up crews.
Reference15 articles.
1. P. Zhang, Q. Zhao, J. Gao, W. Li and J. Lu, "Urban Street Cleanliness Assessment Using Mobile Edge Computing and Deep Learning," in IEEE Access, vol. 7, pp. 63550-63563, 2019, doi: 10.1109/ACCESS.2019.2914270.
2. Chahar, H., Keshavamurthy, B.N. & Modi, C. Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir’s secret sharing scheme. Sādhanā 42, 1997–2007 (2017). https://doi.org/10.1007/s12046-017-0743-4
3. S. Dolev, P. Gupta, Y. Li, S. Mehrotra and S. Sharma, "Privacy-Preserving Secret Shared Computations Using MapReduce," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 4, pp. 1645-1666, 1 July-Aug. 2021, doi: 10.1109/TDSC.2019.2933844.
4. Sneha Khemani and Payal Awwal, “Privacy Preserving In Tpa Using Blowfish Encryption And Shamir’s Secret Sharing For Secure Cloud” in International Journal of Engineering Science Invention (IJESI),www.ijesi.org ||Volume 7 Issue 5 Ver. III || May 2018 || PP 66-71
5. Pedersen, Thomas & Saygin, Yucel & Savas, Erkay. (2007). Secret Sharing vs. Encryption- based Techniques For Privacy Preserving Data Mining 1