OUATTARA Sie, RUAN Xiaogang, Yan yan

Institute of Artificial Intelligence and Robots, School of Electronic Information and Control Engineering

Beijing University of Technology Beijing, China  

' = ∑b1' (i) 2 /(n1 × p1 )                      (15)

i=1 np2

                             f 2' = ∑b2' (i) 2 /(n2 × p2 )                     (16)

j=1

Step8: get the threshold α1 of shadow area and α2 of lighting area:

                               a2                     b2                    c2

Figure 2.  Binary Design sketch

 

Fig. 2 includes the shadow area and the lighting area, which are acquired by binary algorithm under different lighting conditions. b,b1,b2 are the binary result of shadow area; c,c1,c2 are the binary result in lighting area.

 

                       II.   DILATATION OF BINARY IMAGE

This article deal with the binary image by using dilation of morphology for finding the suitable area. Suppose M, N are both sets in R (two-dimensional space). Here N is called as structural element. M is dilated by N and defined as:

                                MN = {a | (N)a IM ≠Φ}             (19)

Among  {w | w =−n,nN} , shows the reflection for N.

        a,n       , shows translate the

reflection of N to the position of a = (a1,a2).

In Fig. 3, if a is the set M, c acts as the structure element N and its mapping. N is equal to its mapping, should be Symmetric about the Origin. C is the result that M is dilated for N. The white area is the dilated area.

        a: M                             b: N                       c:        M:N               

Figure 3.  Diagram of Dilatation Algorithm

 

Using dilatation theory to look for character of the target has good reason. It chooses the structure with the size of n×n to dilatate the binary topographic map. All the lighting point is dilated by the structure. Even the smallest size is nearly reached n/2 . After dilatation, the black part in the image is flat and smooth, more far away from the obstacles.

 

            III.   THE CHOSEN OF THE SAFE LANDING AREA  

Choosing the safe landing area in the image which has been dilated binarily should be following the rules as shown in bellow:

(1)   For let the chosen landing area to be near the central part of the image, if M1 × M2 is the original size, n1 ×n2 is the structure size, the original image should delete the n1and n2 of the both ends of length and width and get the result (M1 -2×n1)×(M2 -2×n2) .

(2)   The size of landing area is usually the maximum inscribed rectangular of the undilated area. 

(3)   For convenience to track the chosen landing area, it is better exist some reference feature like rocks and meteor crater around it. Therefore, it may develop the real-time navigation for the space machine

using the center of safe landing area as the target and reference feature as the landmark.

 

 

                       IV.   EXPERIMENTS AND ANALYSIS

 Figure 4.  Image of experiment

 

This article uses the pictures of Small Bodies 433 EROS of NEAR exploration in 2001 to test the performance of the algorithm. As showing in Fig. 4, from picture a to d, the high of shot is from high to low, and there exists the big different lighting condition. In this experiment, it introduces the projecting experiment for shadow area and lighting area of binary algorithm for the four pictures in Fig. 4. As Fig.5 showing:

 Figure 5.  Binary image

 

Seeing from Fig. 5, shadow area and lighting area in Fig. 4 has been shown very well. The following is using dilatation algorithm to dilatate the shadow area and lighting area in Fig. 5. The size of the dilated structure may be adjusted according to the image size. Usually, the side length of structure should be the 1/20 of the minimum side length of the image. The size of the four pictures of this article is 388x496. Therefore, the size of the structure is 20x20.

 

Figure 6.  The effect picture of dilated binary image

 

Fig. 6 is the dilated picture of the binary image in Fig. 5. Seeing from the picture, the shadow area and lighting area are enlarged obviously, the undilated area has not the obstacles, which has a distance from the area with obstacles. This area can be the safe landing area for the space machine. According to the above rules, the red rectangular area can be the best choice for safe landing. While there exists much more noise and more complicated texture, which decrease the size of safe landing area in the dilated image. For this can use the filter to filt the noise and the trivial texture.

The algorithm in this article is real-time effectively, which calculates the four images of Fig. 4 only in 1 second separately.

 

                                       V.    CONCLUSION

This article provides an algorithm for searching safe landing, which focus on dilatation of binary image for shadow area and lighting area. There are several advantages: (1) it is a new binary algorithm for extracting shadow area and lighting area in the image. (2) Using morphologic dilatation to dilatate shadow area and lighting area in the binary image shows the improvement of safe landing for the space machines. (3) This algorithm is real-time and timesaving, which is valid for choosing the safe landing area.

There also has some limitation of this algorithm. One is the threshold in shadow area and lighting area of binary algorithm is the global threshold, which has uncertainty under the circumstance of the more complicated topography and lighting condition. The other is the filter for the noise and complexes texture in the image should be chosen one more suitable to deal with the image. 

 

REFERENCES

 

[1]     M. P. Golombek, et al. "Assessment of Mars Exploration Rover landing site predictions," Nature, London, vol. 436.7047, pp. 44-48, July 2005.

[2]     J. A. Grant, et al. "Selecting landing sites for the 2003 Mars Exploration Rovers," Planet. Space. Sci. England, vol. 52.1, pp. 11-21, January 2004.

[3]     Z. X. Zhang, W. D. Wang, and P. Y. Cui, "A reliable algorithm of rock detection and avoidance for safe spacecraft landing," 2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics (ISSCAA), Harbin, pp. 1009-1013, June 2010.       

[4]     A. E. Johnson, A. R. Klumpp, J. Collier, and A. Wolf, "LIDAR-based hazard avoidance for safe landing on Mars," J. Guid. Control. Dyn. Vol. 25, no. 6, pp. 1091-1099, November 2002.

[5]     A. E. Johnson, E. Skulsky, M. Bajracharya, and E. Wong. "Design of a Hazard Detection and Avoidance System for the Mars Smart Lander (AIAA-2002-4620)," In AIAA Atmospheric Flight Mechanics Conference, Monterey, CA. 2002.

[6]     Andrew E.Johnson,Andres Huertas. “Analysis of on board hazard detection and avoidance for safe lunar landing”. In Aerospace Conference, 2008 IEEE. Big Sky, MT, pp. 1-9, March 2008

[7]     D.E. Bernard, M.P. Golombek, “Crater and rock hazard modeling for Mars landing”, In proceedings of AIAA Space Conference. 2001 

[8]     N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans. Syst. Man Cybern. vol. New York, SMC-9(1), pp. 62-66, January 1979.

[9]     H. W. Liang, "Direct determination of threshold from bi-modal histogram," Pattern. Recognit. Artif. Intell. Hefei, Vol. 15(2), pp. 253256, June 2002.

[10]  H. Cao, G. Q. Si, and Y. B. Zhang. "A density-neighbors-based incremental outlier detection algorithm." Pattern. Recognit. Artif. Intell. Hefei, Vol. 22(6), pp. 931-935, December 2009

[11]  Rafael C. Gonzalez, Richard E. “Digital Image Processing. Pearson

Education“. Gatesmark Publishing, 2009, pp. 15-267 

Study on Algorithm of Selecting Safe Landing Area on Ground During Asteroid Soft Landing (EEIC2013 +161)的更多相关文章

  1. PatentTips - Adaptive algorithm for selecting a virtualization algorithm in virtual machine environments

    BACKGROUND A Virtual Machine (VM) is an efficient, isolated duplicate of a real computer system. Mor ...

  2. 简介 - SAFe(Scaled Agile Framework,规模化敏捷框架)

    简介 SAFe(Scaled Agile Framework,规模化敏捷框架) SAFe:https://www.scaledagileframework.com/ Scaled Agile Fram ...

  3. RFC 2616

    Network Working Group R. Fielding Request for Comments: 2616 UC Irvine Obsoletes: 2068 J. Gettys Cat ...

  4. CatBoost使用GPU实现决策树的快速梯度提升CatBoost Enables Fast Gradient Boosting on Decision Trees Using GPUs

    python机器学习-乳腺癌细胞挖掘(博主亲自录制视频)https://study.163.com/course/introduction.htm?courseId=1005269003&ut ...

  5. 自然语言26_perplexity信息

    http://www.ithao123.cn/content-296918.html 首页 > 技术 > 编程 > Python > Python 文本挖掘:简单的自然语言统计 ...

  6. karottc A Simple linux-virus Analysis、Linux Kernel <= 2.6.37 - Local Privilege Escalation、CVE-2010-4258、CVE-2010-3849、CVE-2010-3850

    catalog . 程序功能概述 . 感染文件 . 前置知识 . 获取ROOT权限: Linux Kernel <= - Local Privilege Escalation 1. 程序功能概述 ...

  7. LA 3211

    As you must have experienced, instead of landing immediately, an aircraft sometimes waits in a holdi ...

  8. UVA 1146 Now or later

    The Terminal Radar Approach CONtrol (TRACON) controls aircraft approaching and departing when they a ...

  9. Seven Techniques for Data Dimensionality Reduction

    Seven Techniques for Data Dimensionality Reduction Seven Techniques for Data Dimensionality Reductio ...

随机推荐

  1. day20 FORM补充(随时更新),F/Q操作,model之多对多,django中间件,缓存,信号

    python-day20 1.FROM生成select标签的数据应该来源于数据库. 2.model 操作 F/Q  (组合查询) 3.model 多对多操作. 4.中间件 :在请求到达url前先会经过 ...

  2. QQ音乐项目(OC版) - 实现细节

    QQ 音乐看似简单,但自己手动实现起来,才发现没有那么简单,有好多细节,需要注意. github : https://github.com/keenleung/QQMusic-OC 一.业务逻辑 首先 ...

  3. h5移动开发css

    最近刚开始做移动端的开发,接触到很多新的东西,很荣幸(*^__^*) , 下面我们开始正式介绍最近新接触到的属性啦,一起进步: 1.点击按钮等会产生阴影,可设置这个属性:-webkit-tap-hig ...

  4. 小题精炼-----初试C语言

    毫无疑问, 这个又是给新入门学C语言的小鲜肉准备的! 题解: 1. 直接两个循环就ok啦! 当初讲课的时候几乎讲过原题啦. 2. 直接 100的三次方就是1000000啦, 所以直接对某数的三次方开方 ...

  5. c++ IO的继承结构

    #include <stdio.h> #include <iostream>//cin,cout #include <sstream>//ss transfer. ...

  6. Maven仓库构建

    什么是Maven仓库 在不用Maven的时候,比如说以前我们用Ant构建项目,在项目目录下,往往会看到一个名为/lib的子目录,那里存放着各类第三方依赖jar文件,如log4j.jar,junit.j ...

  7. N-Queens II

    Description: Follow up for N-Queens problem. Now, instead outputting board configurations, return th ...

  8. ios8中,相册创建后手动删除,不能再进行创建显示

    // Add a new ALAssetsGroup to the library. // The name of the ALAssetsGroup is name and the type is ...

  9. hiho_1049 二叉树遍历

    题目大意 给出一棵二叉树的前序和中序遍历结果,求出后序遍历的结果.保证二叉树中节点值均不相同. 分析 通过前序和中序遍历的结果,我们可以构建出二叉树,若构建出二叉树,则后序遍历的结果很容易求出(当然递 ...

  10. opencl gauss filter优化(二)

    1.buffer使用image的方式:Horizontal 与 Vertical 算法一样, 共需30ms,wait time 19ms. const sampler_t sampler = CLK_ ...