OUATTARA Sie, RUAN Xiaogang, Yan yan

Institute of Artificial Intelligence and Robots, School of Electronic Information and Control Engineering

Beijing University of Technology Beijing, China  

' = ∑b1' (i) 2 /(n1 × p1 )                      (15)

i=1 np2

                             f 2' = ∑b2' (i) 2 /(n2 × p2 )                     (16)

j=1

Step8: get the threshold α1 of shadow area and α2 of lighting area:

                               a2                     b2                    c2

Figure 2.  Binary Design sketch

 

Fig. 2 includes the shadow area and the lighting area, which are acquired by binary algorithm under different lighting conditions. b,b1,b2 are the binary result of shadow area; c,c1,c2 are the binary result in lighting area.

 

                       II.   DILATATION OF BINARY IMAGE

This article deal with the binary image by using dilation of morphology for finding the suitable area. Suppose M, N are both sets in R (two-dimensional space). Here N is called as structural element. M is dilated by N and defined as:

                                MN = {a | (N)a IM ≠Φ}             (19)

Among  {w | w =−n,nN} , shows the reflection for N.

        a,n       , shows translate the

reflection of N to the position of a = (a1,a2).

In Fig. 3, if a is the set M, c acts as the structure element N and its mapping. N is equal to its mapping, should be Symmetric about the Origin. C is the result that M is dilated for N. The white area is the dilated area.

        a: M                             b: N                       c:        M:N               

Figure 3.  Diagram of Dilatation Algorithm

 

Using dilatation theory to look for character of the target has good reason. It chooses the structure with the size of n×n to dilatate the binary topographic map. All the lighting point is dilated by the structure. Even the smallest size is nearly reached n/2 . After dilatation, the black part in the image is flat and smooth, more far away from the obstacles.

 

            III.   THE CHOSEN OF THE SAFE LANDING AREA  

Choosing the safe landing area in the image which has been dilated binarily should be following the rules as shown in bellow:

(1)   For let the chosen landing area to be near the central part of the image, if M1 × M2 is the original size, n1 ×n2 is the structure size, the original image should delete the n1and n2 of the both ends of length and width and get the result (M1 -2×n1)×(M2 -2×n2) .

(2)   The size of landing area is usually the maximum inscribed rectangular of the undilated area. 

(3)   For convenience to track the chosen landing area, it is better exist some reference feature like rocks and meteor crater around it. Therefore, it may develop the real-time navigation for the space machine

using the center of safe landing area as the target and reference feature as the landmark.

 

 

                       IV.   EXPERIMENTS AND ANALYSIS

 Figure 4.  Image of experiment

 

This article uses the pictures of Small Bodies 433 EROS of NEAR exploration in 2001 to test the performance of the algorithm. As showing in Fig. 4, from picture a to d, the high of shot is from high to low, and there exists the big different lighting condition. In this experiment, it introduces the projecting experiment for shadow area and lighting area of binary algorithm for the four pictures in Fig. 4. As Fig.5 showing:

 Figure 5.  Binary image

 

Seeing from Fig. 5, shadow area and lighting area in Fig. 4 has been shown very well. The following is using dilatation algorithm to dilatate the shadow area and lighting area in Fig. 5. The size of the dilated structure may be adjusted according to the image size. Usually, the side length of structure should be the 1/20 of the minimum side length of the image. The size of the four pictures of this article is 388x496. Therefore, the size of the structure is 20x20.

 

Figure 6.  The effect picture of dilated binary image

 

Fig. 6 is the dilated picture of the binary image in Fig. 5. Seeing from the picture, the shadow area and lighting area are enlarged obviously, the undilated area has not the obstacles, which has a distance from the area with obstacles. This area can be the safe landing area for the space machine. According to the above rules, the red rectangular area can be the best choice for safe landing. While there exists much more noise and more complicated texture, which decrease the size of safe landing area in the dilated image. For this can use the filter to filt the noise and the trivial texture.

The algorithm in this article is real-time effectively, which calculates the four images of Fig. 4 only in 1 second separately.

 

                                       V.    CONCLUSION

This article provides an algorithm for searching safe landing, which focus on dilatation of binary image for shadow area and lighting area. There are several advantages: (1) it is a new binary algorithm for extracting shadow area and lighting area in the image. (2) Using morphologic dilatation to dilatate shadow area and lighting area in the binary image shows the improvement of safe landing for the space machines. (3) This algorithm is real-time and timesaving, which is valid for choosing the safe landing area.

There also has some limitation of this algorithm. One is the threshold in shadow area and lighting area of binary algorithm is the global threshold, which has uncertainty under the circumstance of the more complicated topography and lighting condition. The other is the filter for the noise and complexes texture in the image should be chosen one more suitable to deal with the image. 

 

REFERENCES

 

[1]     M. P. Golombek, et al. "Assessment of Mars Exploration Rover landing site predictions," Nature, London, vol. 436.7047, pp. 44-48, July 2005.

[2]     J. A. Grant, et al. "Selecting landing sites for the 2003 Mars Exploration Rovers," Planet. Space. Sci. England, vol. 52.1, pp. 11-21, January 2004.

[3]     Z. X. Zhang, W. D. Wang, and P. Y. Cui, "A reliable algorithm of rock detection and avoidance for safe spacecraft landing," 2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics (ISSCAA), Harbin, pp. 1009-1013, June 2010.       

[4]     A. E. Johnson, A. R. Klumpp, J. Collier, and A. Wolf, "LIDAR-based hazard avoidance for safe landing on Mars," J. Guid. Control. Dyn. Vol. 25, no. 6, pp. 1091-1099, November 2002.

[5]     A. E. Johnson, E. Skulsky, M. Bajracharya, and E. Wong. "Design of a Hazard Detection and Avoidance System for the Mars Smart Lander (AIAA-2002-4620)," In AIAA Atmospheric Flight Mechanics Conference, Monterey, CA. 2002.

[6]     Andrew E.Johnson,Andres Huertas. “Analysis of on board hazard detection and avoidance for safe lunar landing”. In Aerospace Conference, 2008 IEEE. Big Sky, MT, pp. 1-9, March 2008

[7]     D.E. Bernard, M.P. Golombek, “Crater and rock hazard modeling for Mars landing”, In proceedings of AIAA Space Conference. 2001 

[8]     N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans. Syst. Man Cybern. vol. New York, SMC-9(1), pp. 62-66, January 1979.

[9]     H. W. Liang, "Direct determination of threshold from bi-modal histogram," Pattern. Recognit. Artif. Intell. Hefei, Vol. 15(2), pp. 253256, June 2002.

[10]  H. Cao, G. Q. Si, and Y. B. Zhang. "A density-neighbors-based incremental outlier detection algorithm." Pattern. Recognit. Artif. Intell. Hefei, Vol. 22(6), pp. 931-935, December 2009

[11]  Rafael C. Gonzalez, Richard E. “Digital Image Processing. Pearson

Education“. Gatesmark Publishing, 2009, pp. 15-267 

Study on Algorithm of Selecting Safe Landing Area on Ground During Asteroid Soft Landing (EEIC2013 +161)的更多相关文章

  1. PatentTips - Adaptive algorithm for selecting a virtualization algorithm in virtual machine environments

    BACKGROUND A Virtual Machine (VM) is an efficient, isolated duplicate of a real computer system. Mor ...

  2. 简介 - SAFe(Scaled Agile Framework,规模化敏捷框架)

    简介 SAFe(Scaled Agile Framework,规模化敏捷框架) SAFe:https://www.scaledagileframework.com/ Scaled Agile Fram ...

  3. RFC 2616

    Network Working Group R. Fielding Request for Comments: 2616 UC Irvine Obsoletes: 2068 J. Gettys Cat ...

  4. CatBoost使用GPU实现决策树的快速梯度提升CatBoost Enables Fast Gradient Boosting on Decision Trees Using GPUs

    python机器学习-乳腺癌细胞挖掘(博主亲自录制视频)https://study.163.com/course/introduction.htm?courseId=1005269003&ut ...

  5. 自然语言26_perplexity信息

    http://www.ithao123.cn/content-296918.html 首页 > 技术 > 编程 > Python > Python 文本挖掘:简单的自然语言统计 ...

  6. karottc A Simple linux-virus Analysis、Linux Kernel <= 2.6.37 - Local Privilege Escalation、CVE-2010-4258、CVE-2010-3849、CVE-2010-3850

    catalog . 程序功能概述 . 感染文件 . 前置知识 . 获取ROOT权限: Linux Kernel <= - Local Privilege Escalation 1. 程序功能概述 ...

  7. LA 3211

    As you must have experienced, instead of landing immediately, an aircraft sometimes waits in a holdi ...

  8. UVA 1146 Now or later

    The Terminal Radar Approach CONtrol (TRACON) controls aircraft approaching and departing when they a ...

  9. Seven Techniques for Data Dimensionality Reduction

    Seven Techniques for Data Dimensionality Reduction Seven Techniques for Data Dimensionality Reductio ...

随机推荐

  1. poj 1410 线段相交判断

    http://poj.org/problem?id=1410 Intersection Time Limit: 1000MS   Memory Limit: 10000K Total Submissi ...

  2. 容易混淆的url src href

    新手刚学习的时候会分不清 url  src  href这些,不知道什么情况下应该用哪个.现在让我来理一理. url 统一资源定位符是对可以从互联网上得到的资源的位置和访问方法的一种简洁的表示,是互联网 ...

  3. WCF学习资源收集汇总

    1.WCF编程 http://www.cnblogs.com/wengyuli/category/217446.html 2.wcf热门问题编程示例 http://blog.csdn.net/book ...

  4. read 隐藏用户输入

    有时会需要脚本用户进行输入,但不希望输入的数据显示在监视器上,典型的例子就是输入密码,当然还有很多其它类型的数据需要隐藏.-s选项就能够使read命令中输入的数据不现实在监视器上(实际上,数据是显示的 ...

  5. 2013 Multi-University Training Contest 4

    HDU-4632 Palindrome subsequence 题意:给定一个字符串,长度最长为1000,问该串有多少个回文子串. 分析:设dp[i][j]表示从 i 到 j 有多少个回文子串,则有动 ...

  6. iOS - Swift 数据持久化

    1.Sandbox 沙箱 iOS 为每个应用提供了独立的文件空间,一个应用只能直接访问为本应用分配的文件目录,不可以访问其他目录,每个应用自己独立的访问空间被称为该应用的沙盒.也就是说,一个应用与文件 ...

  7. ubuntu_杂

    1. 虚拟机安装的 ubuntu 12.04,在关闭了 一段时间不操作就屏保 和 锁屏 之后, 在一段时间之后 虚拟机的屏幕还是变黑了,貌似是 os将 显示器关闭了. 这个相关的设置是在哪里? 相关设 ...

  8. xutils使用过程

    1,导入xutils的jar包 2,添加xutils需要使用的权限 <uses-permission android:name="android.permission.INTERNET ...

  9. Android 数据库升级解决方案

    转自:http://blog.csdn.net/leehong2005/article/details/9128501 请考虑如下情况: 在数据库升级时,不同版本的数据库,他们定义的表结构完全可能是不 ...

  10. android widget 点击进入应用

    package com.ljapps.wifix.ui.provider; import android.app.PendingIntent; import android.appwidget.App ...