OUATTARA Sie, RUAN Xiaogang, Yan yan

Institute of Artificial Intelligence and Robots, School of Electronic Information and Control Engineering

Beijing University of Technology Beijing, China  

' = ∑b1' (i) 2 /(n1 × p1 )                      (15)

i=1 np2

                             f 2' = ∑b2' (i) 2 /(n2 × p2 )                     (16)

j=1

Step8: get the threshold α1 of shadow area and α2 of lighting area:

                               a2                     b2                    c2

Figure 2.  Binary Design sketch

 

Fig. 2 includes the shadow area and the lighting area, which are acquired by binary algorithm under different lighting conditions. b,b1,b2 are the binary result of shadow area; c,c1,c2 are the binary result in lighting area.

 

                       II.   DILATATION OF BINARY IMAGE

This article deal with the binary image by using dilation of morphology for finding the suitable area. Suppose M, N are both sets in R (two-dimensional space). Here N is called as structural element. M is dilated by N and defined as:

                                MN = {a | (N)a IM ≠Φ}             (19)

Among  {w | w =−n,nN} , shows the reflection for N.

        a,n       , shows translate the

reflection of N to the position of a = (a1,a2).

In Fig. 3, if a is the set M, c acts as the structure element N and its mapping. N is equal to its mapping, should be Symmetric about the Origin. C is the result that M is dilated for N. The white area is the dilated area.

        a: M                             b: N                       c:        M:N               

Figure 3.  Diagram of Dilatation Algorithm

 

Using dilatation theory to look for character of the target has good reason. It chooses the structure with the size of n×n to dilatate the binary topographic map. All the lighting point is dilated by the structure. Even the smallest size is nearly reached n/2 . After dilatation, the black part in the image is flat and smooth, more far away from the obstacles.

 

            III.   THE CHOSEN OF THE SAFE LANDING AREA  

Choosing the safe landing area in the image which has been dilated binarily should be following the rules as shown in bellow:

(1)   For let the chosen landing area to be near the central part of the image, if M1 × M2 is the original size, n1 ×n2 is the structure size, the original image should delete the n1and n2 of the both ends of length and width and get the result (M1 -2×n1)×(M2 -2×n2) .

(2)   The size of landing area is usually the maximum inscribed rectangular of the undilated area. 

(3)   For convenience to track the chosen landing area, it is better exist some reference feature like rocks and meteor crater around it. Therefore, it may develop the real-time navigation for the space machine

using the center of safe landing area as the target and reference feature as the landmark.

 

 

                       IV.   EXPERIMENTS AND ANALYSIS

 Figure 4.  Image of experiment

 

This article uses the pictures of Small Bodies 433 EROS of NEAR exploration in 2001 to test the performance of the algorithm. As showing in Fig. 4, from picture a to d, the high of shot is from high to low, and there exists the big different lighting condition. In this experiment, it introduces the projecting experiment for shadow area and lighting area of binary algorithm for the four pictures in Fig. 4. As Fig.5 showing:

 Figure 5.  Binary image

 

Seeing from Fig. 5, shadow area and lighting area in Fig. 4 has been shown very well. The following is using dilatation algorithm to dilatate the shadow area and lighting area in Fig. 5. The size of the dilated structure may be adjusted according to the image size. Usually, the side length of structure should be the 1/20 of the minimum side length of the image. The size of the four pictures of this article is 388x496. Therefore, the size of the structure is 20x20.

 

Figure 6.  The effect picture of dilated binary image

 

Fig. 6 is the dilated picture of the binary image in Fig. 5. Seeing from the picture, the shadow area and lighting area are enlarged obviously, the undilated area has not the obstacles, which has a distance from the area with obstacles. This area can be the safe landing area for the space machine. According to the above rules, the red rectangular area can be the best choice for safe landing. While there exists much more noise and more complicated texture, which decrease the size of safe landing area in the dilated image. For this can use the filter to filt the noise and the trivial texture.

The algorithm in this article is real-time effectively, which calculates the four images of Fig. 4 only in 1 second separately.

 

                                       V.    CONCLUSION

This article provides an algorithm for searching safe landing, which focus on dilatation of binary image for shadow area and lighting area. There are several advantages: (1) it is a new binary algorithm for extracting shadow area and lighting area in the image. (2) Using morphologic dilatation to dilatate shadow area and lighting area in the binary image shows the improvement of safe landing for the space machines. (3) This algorithm is real-time and timesaving, which is valid for choosing the safe landing area.

There also has some limitation of this algorithm. One is the threshold in shadow area and lighting area of binary algorithm is the global threshold, which has uncertainty under the circumstance of the more complicated topography and lighting condition. The other is the filter for the noise and complexes texture in the image should be chosen one more suitable to deal with the image. 

 

REFERENCES

 

[1]     M. P. Golombek, et al. "Assessment of Mars Exploration Rover landing site predictions," Nature, London, vol. 436.7047, pp. 44-48, July 2005.

[2]     J. A. Grant, et al. "Selecting landing sites for the 2003 Mars Exploration Rovers," Planet. Space. Sci. England, vol. 52.1, pp. 11-21, January 2004.

[3]     Z. X. Zhang, W. D. Wang, and P. Y. Cui, "A reliable algorithm of rock detection and avoidance for safe spacecraft landing," 2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics (ISSCAA), Harbin, pp. 1009-1013, June 2010.       

[4]     A. E. Johnson, A. R. Klumpp, J. Collier, and A. Wolf, "LIDAR-based hazard avoidance for safe landing on Mars," J. Guid. Control. Dyn. Vol. 25, no. 6, pp. 1091-1099, November 2002.

[5]     A. E. Johnson, E. Skulsky, M. Bajracharya, and E. Wong. "Design of a Hazard Detection and Avoidance System for the Mars Smart Lander (AIAA-2002-4620)," In AIAA Atmospheric Flight Mechanics Conference, Monterey, CA. 2002.

[6]     Andrew E.Johnson,Andres Huertas. “Analysis of on board hazard detection and avoidance for safe lunar landing”. In Aerospace Conference, 2008 IEEE. Big Sky, MT, pp. 1-9, March 2008

[7]     D.E. Bernard, M.P. Golombek, “Crater and rock hazard modeling for Mars landing”, In proceedings of AIAA Space Conference. 2001 

[8]     N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans. Syst. Man Cybern. vol. New York, SMC-9(1), pp. 62-66, January 1979.

[9]     H. W. Liang, "Direct determination of threshold from bi-modal histogram," Pattern. Recognit. Artif. Intell. Hefei, Vol. 15(2), pp. 253256, June 2002.

[10]  H. Cao, G. Q. Si, and Y. B. Zhang. "A density-neighbors-based incremental outlier detection algorithm." Pattern. Recognit. Artif. Intell. Hefei, Vol. 22(6), pp. 931-935, December 2009

[11]  Rafael C. Gonzalez, Richard E. “Digital Image Processing. Pearson

Education“. Gatesmark Publishing, 2009, pp. 15-267 

Study on Algorithm of Selecting Safe Landing Area on Ground During Asteroid Soft Landing (EEIC2013 +161)的更多相关文章

  1. PatentTips - Adaptive algorithm for selecting a virtualization algorithm in virtual machine environments

    BACKGROUND A Virtual Machine (VM) is an efficient, isolated duplicate of a real computer system. Mor ...

  2. 简介 - SAFe(Scaled Agile Framework,规模化敏捷框架)

    简介 SAFe(Scaled Agile Framework,规模化敏捷框架) SAFe:https://www.scaledagileframework.com/ Scaled Agile Fram ...

  3. RFC 2616

    Network Working Group R. Fielding Request for Comments: 2616 UC Irvine Obsoletes: 2068 J. Gettys Cat ...

  4. CatBoost使用GPU实现决策树的快速梯度提升CatBoost Enables Fast Gradient Boosting on Decision Trees Using GPUs

    python机器学习-乳腺癌细胞挖掘(博主亲自录制视频)https://study.163.com/course/introduction.htm?courseId=1005269003&ut ...

  5. 自然语言26_perplexity信息

    http://www.ithao123.cn/content-296918.html 首页 > 技术 > 编程 > Python > Python 文本挖掘:简单的自然语言统计 ...

  6. karottc A Simple linux-virus Analysis、Linux Kernel <= 2.6.37 - Local Privilege Escalation、CVE-2010-4258、CVE-2010-3849、CVE-2010-3850

    catalog . 程序功能概述 . 感染文件 . 前置知识 . 获取ROOT权限: Linux Kernel <= - Local Privilege Escalation 1. 程序功能概述 ...

  7. LA 3211

    As you must have experienced, instead of landing immediately, an aircraft sometimes waits in a holdi ...

  8. UVA 1146 Now or later

    The Terminal Radar Approach CONtrol (TRACON) controls aircraft approaching and departing when they a ...

  9. Seven Techniques for Data Dimensionality Reduction

    Seven Techniques for Data Dimensionality Reduction Seven Techniques for Data Dimensionality Reductio ...

随机推荐

  1. Mac : 强大的截图

    来源:http://irising.me/2011/11/12135/ Mac的截图功能扩展功能很强大的,不要用QQ那个COM+Ctrl+A弱爆了的截图了~ 首先说一下两种截图1.Command+sh ...

  2. Nexus4_文件名乱码

    1. 官方的出厂映像 for Android4.4:occam-krt16s-factory-2006f418.tgz 2. 自己编译的 Android-4.4_r1 (AOSP on Mako) 映 ...

  3. Python学习(10)元组

    目录 Python 元组 访问元组 修改元组 删除元组 元组运算符 元组索引,截取 无关闭分隔符 元组内置函数 Python 元组 Python的元组与列表类似,不同之处在于元组的元素不能修改. 元组 ...

  4. 线程高级应用-心得6-java5线程并发库中同步工具类(synchronizers),新知识大用途

    1.新知识普及 2. Semaphore工具类的使用案例 package com.java5.thread.newSkill; import java.util.concurrent.Executor ...

  5. jquery input选择弹框

    index.jsp <%@ page language="java" contentType="text/html; charset=UTF-8" pag ...

  6. (二)stm32之中断配置

    一.stm32的中断和异常 Cortex拥有强大的异常响应系统,它能够打断当前代码执行流程事件分为异常和中断,它们用一个表管理起来,编号为0~15为内核异常,16以上的为外部中断,这个表就是中断向量表 ...

  7. linux简单配置

    lsof -i lsof -i:211.判断apache查找httpd路径: ps aux | grep httpd 结果:  /usr/local/apache/bin/httpd /usr/loc ...

  8. centos JDK安装

    第一步:查看Linux自带的JDK是否已安装 (卸载centOS已安装的1.4) 安装好的CentOS会自带OpenJdk,用命令 java -version ,会有下面的信息: java versi ...

  9. Android控件之MultiAutoCompleteTextView(自动匹配输入的内容)

    一.功能 可支持选择多个值(在多次输入的情况下),分别用分隔符分开,并且在每个值选中的时候再次输入值时会自动去匹配,可用在发送短信,发邮件时选择联系人这种类型中 二.独特属性 android:comp ...

  10. [转载]WEB缓存技术概述

    [原文地址]http://www.hbjjrb.com/Jishu/ASP/201110/319372.html 引言 WWW是互联网上最受欢迎的应用之一,其快速增长造成网络拥塞和服务器超载,导致客户 ...