OUATTARA Sie, RUAN Xiaogang, Yan yan

Institute of Artificial Intelligence and Robots, School of Electronic Information and Control Engineering

Beijing University of Technology Beijing, China  

' = ∑b1' (i) 2 /(n1 × p1 )                      (15)

i=1 np2

                             f 2' = ∑b2' (i) 2 /(n2 × p2 )                     (16)

j=1

Step8: get the threshold α1 of shadow area and α2 of lighting area:

                               a2                     b2                    c2

Figure 2.  Binary Design sketch

 

Fig. 2 includes the shadow area and the lighting area, which are acquired by binary algorithm under different lighting conditions. b,b1,b2 are the binary result of shadow area; c,c1,c2 are the binary result in lighting area.

 

                       II.   DILATATION OF BINARY IMAGE

This article deal with the binary image by using dilation of morphology for finding the suitable area. Suppose M, N are both sets in R (two-dimensional space). Here N is called as structural element. M is dilated by N and defined as:

                                MN = {a | (N)a IM ≠Φ}             (19)

Among  {w | w =−n,nN} , shows the reflection for N.

        a,n       , shows translate the

reflection of N to the position of a = (a1,a2).

In Fig. 3, if a is the set M, c acts as the structure element N and its mapping. N is equal to its mapping, should be Symmetric about the Origin. C is the result that M is dilated for N. The white area is the dilated area.

        a: M                             b: N                       c:        M:N               

Figure 3.  Diagram of Dilatation Algorithm

 

Using dilatation theory to look for character of the target has good reason. It chooses the structure with the size of n×n to dilatate the binary topographic map. All the lighting point is dilated by the structure. Even the smallest size is nearly reached n/2 . After dilatation, the black part in the image is flat and smooth, more far away from the obstacles.

 

            III.   THE CHOSEN OF THE SAFE LANDING AREA  

Choosing the safe landing area in the image which has been dilated binarily should be following the rules as shown in bellow:

(1)   For let the chosen landing area to be near the central part of the image, if M1 × M2 is the original size, n1 ×n2 is the structure size, the original image should delete the n1and n2 of the both ends of length and width and get the result (M1 -2×n1)×(M2 -2×n2) .

(2)   The size of landing area is usually the maximum inscribed rectangular of the undilated area. 

(3)   For convenience to track the chosen landing area, it is better exist some reference feature like rocks and meteor crater around it. Therefore, it may develop the real-time navigation for the space machine

using the center of safe landing area as the target and reference feature as the landmark.

 

 

                       IV.   EXPERIMENTS AND ANALYSIS

 Figure 4.  Image of experiment

 

This article uses the pictures of Small Bodies 433 EROS of NEAR exploration in 2001 to test the performance of the algorithm. As showing in Fig. 4, from picture a to d, the high of shot is from high to low, and there exists the big different lighting condition. In this experiment, it introduces the projecting experiment for shadow area and lighting area of binary algorithm for the four pictures in Fig. 4. As Fig.5 showing:

 Figure 5.  Binary image

 

Seeing from Fig. 5, shadow area and lighting area in Fig. 4 has been shown very well. The following is using dilatation algorithm to dilatate the shadow area and lighting area in Fig. 5. The size of the dilated structure may be adjusted according to the image size. Usually, the side length of structure should be the 1/20 of the minimum side length of the image. The size of the four pictures of this article is 388x496. Therefore, the size of the structure is 20x20.

 

Figure 6.  The effect picture of dilated binary image

 

Fig. 6 is the dilated picture of the binary image in Fig. 5. Seeing from the picture, the shadow area and lighting area are enlarged obviously, the undilated area has not the obstacles, which has a distance from the area with obstacles. This area can be the safe landing area for the space machine. According to the above rules, the red rectangular area can be the best choice for safe landing. While there exists much more noise and more complicated texture, which decrease the size of safe landing area in the dilated image. For this can use the filter to filt the noise and the trivial texture.

The algorithm in this article is real-time effectively, which calculates the four images of Fig. 4 only in 1 second separately.

 

                                       V.    CONCLUSION

This article provides an algorithm for searching safe landing, which focus on dilatation of binary image for shadow area and lighting area. There are several advantages: (1) it is a new binary algorithm for extracting shadow area and lighting area in the image. (2) Using morphologic dilatation to dilatate shadow area and lighting area in the binary image shows the improvement of safe landing for the space machines. (3) This algorithm is real-time and timesaving, which is valid for choosing the safe landing area.

There also has some limitation of this algorithm. One is the threshold in shadow area and lighting area of binary algorithm is the global threshold, which has uncertainty under the circumstance of the more complicated topography and lighting condition. The other is the filter for the noise and complexes texture in the image should be chosen one more suitable to deal with the image. 

 

REFERENCES

 

[1]     M. P. Golombek, et al. "Assessment of Mars Exploration Rover landing site predictions," Nature, London, vol. 436.7047, pp. 44-48, July 2005.

[2]     J. A. Grant, et al. "Selecting landing sites for the 2003 Mars Exploration Rovers," Planet. Space. Sci. England, vol. 52.1, pp. 11-21, January 2004.

[3]     Z. X. Zhang, W. D. Wang, and P. Y. Cui, "A reliable algorithm of rock detection and avoidance for safe spacecraft landing," 2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics (ISSCAA), Harbin, pp. 1009-1013, June 2010.       

[4]     A. E. Johnson, A. R. Klumpp, J. Collier, and A. Wolf, "LIDAR-based hazard avoidance for safe landing on Mars," J. Guid. Control. Dyn. Vol. 25, no. 6, pp. 1091-1099, November 2002.

[5]     A. E. Johnson, E. Skulsky, M. Bajracharya, and E. Wong. "Design of a Hazard Detection and Avoidance System for the Mars Smart Lander (AIAA-2002-4620)," In AIAA Atmospheric Flight Mechanics Conference, Monterey, CA. 2002.

[6]     Andrew E.Johnson,Andres Huertas. “Analysis of on board hazard detection and avoidance for safe lunar landing”. In Aerospace Conference, 2008 IEEE. Big Sky, MT, pp. 1-9, March 2008

[7]     D.E. Bernard, M.P. Golombek, “Crater and rock hazard modeling for Mars landing”, In proceedings of AIAA Space Conference. 2001 

[8]     N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans. Syst. Man Cybern. vol. New York, SMC-9(1), pp. 62-66, January 1979.

[9]     H. W. Liang, "Direct determination of threshold from bi-modal histogram," Pattern. Recognit. Artif. Intell. Hefei, Vol. 15(2), pp. 253256, June 2002.

[10]  H. Cao, G. Q. Si, and Y. B. Zhang. "A density-neighbors-based incremental outlier detection algorithm." Pattern. Recognit. Artif. Intell. Hefei, Vol. 22(6), pp. 931-935, December 2009

[11]  Rafael C. Gonzalez, Richard E. “Digital Image Processing. Pearson

Education“. Gatesmark Publishing, 2009, pp. 15-267 

Study on Algorithm of Selecting Safe Landing Area on Ground During Asteroid Soft Landing (EEIC2013 +161)的更多相关文章

  1. PatentTips - Adaptive algorithm for selecting a virtualization algorithm in virtual machine environments

    BACKGROUND A Virtual Machine (VM) is an efficient, isolated duplicate of a real computer system. Mor ...

  2. 简介 - SAFe(Scaled Agile Framework,规模化敏捷框架)

    简介 SAFe(Scaled Agile Framework,规模化敏捷框架) SAFe:https://www.scaledagileframework.com/ Scaled Agile Fram ...

  3. RFC 2616

    Network Working Group R. Fielding Request for Comments: 2616 UC Irvine Obsoletes: 2068 J. Gettys Cat ...

  4. CatBoost使用GPU实现决策树的快速梯度提升CatBoost Enables Fast Gradient Boosting on Decision Trees Using GPUs

    python机器学习-乳腺癌细胞挖掘(博主亲自录制视频)https://study.163.com/course/introduction.htm?courseId=1005269003&ut ...

  5. 自然语言26_perplexity信息

    http://www.ithao123.cn/content-296918.html 首页 > 技术 > 编程 > Python > Python 文本挖掘:简单的自然语言统计 ...

  6. karottc A Simple linux-virus Analysis、Linux Kernel <= 2.6.37 - Local Privilege Escalation、CVE-2010-4258、CVE-2010-3849、CVE-2010-3850

    catalog . 程序功能概述 . 感染文件 . 前置知识 . 获取ROOT权限: Linux Kernel <= - Local Privilege Escalation 1. 程序功能概述 ...

  7. LA 3211

    As you must have experienced, instead of landing immediately, an aircraft sometimes waits in a holdi ...

  8. UVA 1146 Now or later

    The Terminal Radar Approach CONtrol (TRACON) controls aircraft approaching and departing when they a ...

  9. Seven Techniques for Data Dimensionality Reduction

    Seven Techniques for Data Dimensionality Reduction Seven Techniques for Data Dimensionality Reductio ...

随机推荐

  1. poj 2187 Beauty Contest (凸包暴力求最远点对+旋转卡壳)

    链接:http://poj.org/problem?id=2187 Description Bessie, Farmer John's prize cow, has just won first pl ...

  2. OnClientClick的用法

    摘自:http://blog.csdn.net/coolpig86/article/details/5439560 OnClientClick用于执行客户端脚本.当我们单击一个按钮时,最先执行的是On ...

  3. Android SDK 更新镜像服务器

    搞个新的电脑,新环境下,SDK总是更新不成功.找了一下,发现有国内的镜像,记录保存一下. Android Tools Android SDK在线更新镜像服务器    中国科学院开源协会镜像站地址:   ...

  4. 《FLASH CC 2015 CANVAS 中文教程》——1、导出canvas动画,文件结构浅析

    注::如果你对 FLASH 这个软件操作不够熟悉,建议你可以先看看FLASH动画之类的书. :FLASH CC 在文中直接简称为CC. :以下所以文章中所说的快捷键 如果你按了不起作用,请检查是否有其 ...

  5. Java内存区域和判断对象“死”“活”算法

    转载自: http://www.cnblogs.com/aigongsi/archive/2012/04/06/2434771.html java与C,c++有很大的不同就是java语言开发者不需要关 ...

  6. ackerman递归

    定义: n+1        n=0 A(m,n)={A(m-1,1) m=0 A(m-1,A(m,n-1)) n>0,m>0 #include <iostream> #inc ...

  7. iOS - OC NSValue 值

    前言 @interface NSValue : NSObject <NSCopying, NSSecureCoding> 将任意数据类型包装成 OC 对象 1.比较两个 NSValue 类 ...

  8. c++ 操作符 重载。

    操作符如关系操作符,全局函数的话,必须第一个是class. 1.赋值(=),下标([ ]),调用(())和成员访问箭头(->)等操作符必须定义为成员,如果定义为非成员的话,程序在编译的时候,会发 ...

  9. web设计经验<三>值得你深入了解的交互设计5大支柱

    随着单页式设计和移动端的兴起,网页中的交互设计越来越重要了.为了打造流畅而可靠的用户体验,你需要对交互设计有更加深入的了解. 正如同我们在<交互设计最佳实践(卷1)>中所述,要做好交互设计 ...

  10. JS常用方法函数

    document.write("");为 输出语句    2.JS中的注释为//    3.传统的HTML文档顺序是:document->html->(head,bod ...