OUATTARA Sie, RUAN Xiaogang, Yan yan

Institute of Artificial Intelligence and Robots, School of Electronic Information and Control Engineering

Beijing University of Technology Beijing, China  

' = ∑b1' (i) 2 /(n1 × p1 )                      (15)

i=1 np2

                             f 2' = ∑b2' (i) 2 /(n2 × p2 )                     (16)

j=1

Step8: get the threshold α1 of shadow area and α2 of lighting area:

                               a2                     b2                    c2

Figure 2.  Binary Design sketch

 

Fig. 2 includes the shadow area and the lighting area, which are acquired by binary algorithm under different lighting conditions. b,b1,b2 are the binary result of shadow area; c,c1,c2 are the binary result in lighting area.

 

                       II.   DILATATION OF BINARY IMAGE

This article deal with the binary image by using dilation of morphology for finding the suitable area. Suppose M, N are both sets in R (two-dimensional space). Here N is called as structural element. M is dilated by N and defined as:

                                MN = {a | (N)a IM ≠Φ}             (19)

Among  {w | w =−n,nN} , shows the reflection for N.

        a,n       , shows translate the

reflection of N to the position of a = (a1,a2).

In Fig. 3, if a is the set M, c acts as the structure element N and its mapping. N is equal to its mapping, should be Symmetric about the Origin. C is the result that M is dilated for N. The white area is the dilated area.

        a: M                             b: N                       c:        M:N               

Figure 3.  Diagram of Dilatation Algorithm

 

Using dilatation theory to look for character of the target has good reason. It chooses the structure with the size of n×n to dilatate the binary topographic map. All the lighting point is dilated by the structure. Even the smallest size is nearly reached n/2 . After dilatation, the black part in the image is flat and smooth, more far away from the obstacles.

 

            III.   THE CHOSEN OF THE SAFE LANDING AREA  

Choosing the safe landing area in the image which has been dilated binarily should be following the rules as shown in bellow:

(1)   For let the chosen landing area to be near the central part of the image, if M1 × M2 is the original size, n1 ×n2 is the structure size, the original image should delete the n1and n2 of the both ends of length and width and get the result (M1 -2×n1)×(M2 -2×n2) .

(2)   The size of landing area is usually the maximum inscribed rectangular of the undilated area. 

(3)   For convenience to track the chosen landing area, it is better exist some reference feature like rocks and meteor crater around it. Therefore, it may develop the real-time navigation for the space machine

using the center of safe landing area as the target and reference feature as the landmark.

 

 

                       IV.   EXPERIMENTS AND ANALYSIS

 Figure 4.  Image of experiment

 

This article uses the pictures of Small Bodies 433 EROS of NEAR exploration in 2001 to test the performance of the algorithm. As showing in Fig. 4, from picture a to d, the high of shot is from high to low, and there exists the big different lighting condition. In this experiment, it introduces the projecting experiment for shadow area and lighting area of binary algorithm for the four pictures in Fig. 4. As Fig.5 showing:

 Figure 5.  Binary image

 

Seeing from Fig. 5, shadow area and lighting area in Fig. 4 has been shown very well. The following is using dilatation algorithm to dilatate the shadow area and lighting area in Fig. 5. The size of the dilated structure may be adjusted according to the image size. Usually, the side length of structure should be the 1/20 of the minimum side length of the image. The size of the four pictures of this article is 388x496. Therefore, the size of the structure is 20x20.

 

Figure 6.  The effect picture of dilated binary image

 

Fig. 6 is the dilated picture of the binary image in Fig. 5. Seeing from the picture, the shadow area and lighting area are enlarged obviously, the undilated area has not the obstacles, which has a distance from the area with obstacles. This area can be the safe landing area for the space machine. According to the above rules, the red rectangular area can be the best choice for safe landing. While there exists much more noise and more complicated texture, which decrease the size of safe landing area in the dilated image. For this can use the filter to filt the noise and the trivial texture.

The algorithm in this article is real-time effectively, which calculates the four images of Fig. 4 only in 1 second separately.

 

                                       V.    CONCLUSION

This article provides an algorithm for searching safe landing, which focus on dilatation of binary image for shadow area and lighting area. There are several advantages: (1) it is a new binary algorithm for extracting shadow area and lighting area in the image. (2) Using morphologic dilatation to dilatate shadow area and lighting area in the binary image shows the improvement of safe landing for the space machines. (3) This algorithm is real-time and timesaving, which is valid for choosing the safe landing area.

There also has some limitation of this algorithm. One is the threshold in shadow area and lighting area of binary algorithm is the global threshold, which has uncertainty under the circumstance of the more complicated topography and lighting condition. The other is the filter for the noise and complexes texture in the image should be chosen one more suitable to deal with the image. 

 

REFERENCES

 

[1]     M. P. Golombek, et al. "Assessment of Mars Exploration Rover landing site predictions," Nature, London, vol. 436.7047, pp. 44-48, July 2005.

[2]     J. A. Grant, et al. "Selecting landing sites for the 2003 Mars Exploration Rovers," Planet. Space. Sci. England, vol. 52.1, pp. 11-21, January 2004.

[3]     Z. X. Zhang, W. D. Wang, and P. Y. Cui, "A reliable algorithm of rock detection and avoidance for safe spacecraft landing," 2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics (ISSCAA), Harbin, pp. 1009-1013, June 2010.       

[4]     A. E. Johnson, A. R. Klumpp, J. Collier, and A. Wolf, "LIDAR-based hazard avoidance for safe landing on Mars," J. Guid. Control. Dyn. Vol. 25, no. 6, pp. 1091-1099, November 2002.

[5]     A. E. Johnson, E. Skulsky, M. Bajracharya, and E. Wong. "Design of a Hazard Detection and Avoidance System for the Mars Smart Lander (AIAA-2002-4620)," In AIAA Atmospheric Flight Mechanics Conference, Monterey, CA. 2002.

[6]     Andrew E.Johnson,Andres Huertas. “Analysis of on board hazard detection and avoidance for safe lunar landing”. In Aerospace Conference, 2008 IEEE. Big Sky, MT, pp. 1-9, March 2008

[7]     D.E. Bernard, M.P. Golombek, “Crater and rock hazard modeling for Mars landing”, In proceedings of AIAA Space Conference. 2001 

[8]     N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans. Syst. Man Cybern. vol. New York, SMC-9(1), pp. 62-66, January 1979.

[9]     H. W. Liang, "Direct determination of threshold from bi-modal histogram," Pattern. Recognit. Artif. Intell. Hefei, Vol. 15(2), pp. 253256, June 2002.

[10]  H. Cao, G. Q. Si, and Y. B. Zhang. "A density-neighbors-based incremental outlier detection algorithm." Pattern. Recognit. Artif. Intell. Hefei, Vol. 22(6), pp. 931-935, December 2009

[11]  Rafael C. Gonzalez, Richard E. “Digital Image Processing. Pearson

Education“. Gatesmark Publishing, 2009, pp. 15-267 

Study on Algorithm of Selecting Safe Landing Area on Ground During Asteroid Soft Landing (EEIC2013 +161)的更多相关文章

  1. PatentTips - Adaptive algorithm for selecting a virtualization algorithm in virtual machine environments

    BACKGROUND A Virtual Machine (VM) is an efficient, isolated duplicate of a real computer system. Mor ...

  2. 简介 - SAFe(Scaled Agile Framework,规模化敏捷框架)

    简介 SAFe(Scaled Agile Framework,规模化敏捷框架) SAFe:https://www.scaledagileframework.com/ Scaled Agile Fram ...

  3. RFC 2616

    Network Working Group R. Fielding Request for Comments: 2616 UC Irvine Obsoletes: 2068 J. Gettys Cat ...

  4. CatBoost使用GPU实现决策树的快速梯度提升CatBoost Enables Fast Gradient Boosting on Decision Trees Using GPUs

    python机器学习-乳腺癌细胞挖掘(博主亲自录制视频)https://study.163.com/course/introduction.htm?courseId=1005269003&ut ...

  5. 自然语言26_perplexity信息

    http://www.ithao123.cn/content-296918.html 首页 > 技术 > 编程 > Python > Python 文本挖掘:简单的自然语言统计 ...

  6. karottc A Simple linux-virus Analysis、Linux Kernel <= 2.6.37 - Local Privilege Escalation、CVE-2010-4258、CVE-2010-3849、CVE-2010-3850

    catalog . 程序功能概述 . 感染文件 . 前置知识 . 获取ROOT权限: Linux Kernel <= - Local Privilege Escalation 1. 程序功能概述 ...

  7. LA 3211

    As you must have experienced, instead of landing immediately, an aircraft sometimes waits in a holdi ...

  8. UVA 1146 Now or later

    The Terminal Radar Approach CONtrol (TRACON) controls aircraft approaching and departing when they a ...

  9. Seven Techniques for Data Dimensionality Reduction

    Seven Techniques for Data Dimensionality Reduction Seven Techniques for Data Dimensionality Reductio ...

随机推荐

  1. HDU 5833 Zhu and 772002

    HDU 5833 Zhu and 772002 Time Limit: 2000/1000 MS (Java/Others)    Memory Limit: 65536/65536 K (Java/ ...

  2. 在ubuntu上配置apue的运行环境

    http://www.apuebook.com/code3e.html 在上面的网站下载代码包,解压得到源码 sudo apt-get install libbsd-dev 安装这个支持,在解压包的m ...

  3. Oracle VM VirtualBox 虚拟机与主机共享文件

    安装增强功能(参考文档) VirtualBox自带了一个增强工具Sun VirtualBox Guest Additions,这是实现虚拟机与真实主机共享的关键.启动虚拟机后,点击控制菜单“设备”→“ ...

  4. HDU-4511 小明系列故事——女友的考验 floyd变种-标号递增最短路

    题意:给定N个点,现在要求出从1号点到N号点的最短路.题目给的限制条件就是对于某条路径是不能够走的,但是可以选择某段路径走,另外就是所走的路径的标号必须是递增的. 分析:由于给定的是一些列的坐标点,这 ...

  5. CentOS6.4_常用命令

    1. 查看本机是否安装了 xxx软件,以及 xxx软件 的版本信息等: rpm -qa |grep  xxx(xxx代表软件名) 2. rpm -ivh 要安装的rpm文件包 3. 不care依赖项的 ...

  6. bootstrap学习笔记<五>(表单一)

    表单 bootstrap为表单提供三种样式:默认表单,水平表单,内联表单. <form class="form-horizontal" role="form&quo ...

  7. rpm and yum commands

    rpm命令 rpm包,由“-”.“.”构成,包名.版本信息.版本号.运行平台 对已安装软件信息的查询 rpm -qa                             查询已安装的软件 rpm ...

  8. Python循环嵌套

    可以在循环体内嵌入其他的循环体,如在while循环中可以嵌入for循环, 反之,你可以在for循环中嵌入while循环. 实例: 以下实例使用了嵌套循环输出3~13之间的素数: 以上实例输出结果: F ...

  9. (三)ubuntu学习前传—uboot常见环境变量

    1.环境变量如何参与程序运行(1)环境变量有2份,一份在Flash中,另一份在DDR中.uboot开机时一次性从Flash中读取全部环境变量到DDR中作为环境变量的初始化值,然后使用过程中都是用DDR ...

  10. POJ 3468 线段树裸题

    这些天一直在看线段树,因为临近期末,所以看得断断续续,弄得有些知识点没能理解得很透切,但我也知道不能钻牛角尖,所以配合着刷题来加深理解. 然后,这是线段树裸题,而且是最简单的区间增加与查询,我参考了A ...