Being able to safely land on the surface is one of the primary challenges when a probe exploring an asteroid. In order to ensure landing safety, the landing location planning needs to comprehensively consider the terr...
详细信息
ISBN:
(数字)9798350363173
ISBN:
(纸本)9798350363180
Being able to safely land on the surface is one of the primary challenges when a probe exploring an asteroid. In order to ensure landing safety, the landing location planning needs to comprehensively consider the terrain characteristics and avoid obstacles such as protruding rocks, craters and slopes. Relatively flat areas are suitable for landing. If multiple landers are landing together, in order to avoid collisions and maintain good communication, appropriate distance should be maintained between the landers. In this paper, we first establish a landing environment model, and then propose a landing location planning method for a lander-group using genetic cooperative particle swarm optimization (GCPSO), which ensures the autonomous movement of individual landers while maintaining a certain safe landing distance between them. Taking a group of three landers as an example, simulation experiments show that the algorithm proposed in this paper can ensure the group to achieve stable landing and keep safe distances between them.
High-precision three-dimensional models of small celestial bodies are important for deep space exploration tasks. The homologous point cloud obtained from a single sensor has limitations in terms of accuracy and densi...
详细信息
ISBN:
(数字)9798331509644
ISBN:
(纸本)9798331509651
High-precision three-dimensional models of small celestial bodies are important for deep space exploration tasks. The homologous point cloud obtained from a single sensor has limitations in terms of accuracy and density. For example, the point cloud obtained by RGB camera has rich information and high density, but low precision. The point cloud obtained by laser scanning has high precision but low density. Therefore, we hope to register and fuse the point clouds obtained from different sensors, synthesize the advantages of cross-source point clouds obtained from different source domains, and improve the density, accuracy and other aspects of small celestial point clouds. To solve the common problems of cross-source point clouds, we adopt an end-to-end feature measurement point cloud registration framework, which does not need to search the corresponding points between two point clouds, and reduces the difficulty of processing cross-source point cloud data. Aiming at the problem that some stray points on the registered point cloud surface affect the accuracy of the point cloud, a point cloud fusion optimization method based on Euclidean distance is proposed. The stray points around the point cloud are removed to reduce the loss of normal points. The accuracy of point cloud is improved by the fusion after registration. Experiments show that the proposed method can effectively improve the density and accuracy of small celestial body models.
The application of transformer architecture in analyzing whole slide images (WSIs) has become increasingly popular due to its remarkable ability to learn complex associations. Nevertheless, a significant drawback emer...
详细信息
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achi...
详细信息
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achieving high efficiency in software based *** seems that FeW is immune to many cryptographic attacks,like linear,impossible differential,differential and zero correlation ***,in recent work,Xie et *** the security of *** precisely,they proved that under the differential fault analysis(DFA)on the encryption states,an attacker can completely recover the master secret *** this paper,we revisit the block cipher FeW and consider the DFA on its key schedule algorithm,which is rather popular cryptanalysis for kinds of block *** particular,by respectively injected faults into the 30th and 29th round subkeys,one can recover about 55/80~69%bits of master *** the brute force searching remaining bits,one can obtain the full master secret *** simulations and experiment results show that our analysis is practical.
We propose kernel-based approaches for the construction of a single-step and multi-step predictor of the velocity form of nonlinear (NL) systems, which describes the time-difference dynamics of the corresponding NL sy...
详细信息
We study truthful mechanisms for welfare maximization in online bipartite matching. In our (multiparameter) setting, every buyer is associated with a (possibly private) desired set of items, and has a private value fo...
详细信息
This paper considers the equilibrium-free stability and performance analysis of discrete-time nonlinear systems. We consider two types of equilibrium-free notions. Namely, the universal shifted concept, which consider...
详细信息
In recent years, soft grippers have gained significant attention due to their adaptability and safety. However, when performing horizontal object grasping, their limited structural stiffness prevents them from withsta...
详细信息
The use of autonomous systems in Intensive Care Units (ICUs) has become incredibly important, especially during the COVID-19 pandemic. This period has overwhelmed both ICUs and hospitals, halting many other medical ac...
详细信息
Detecting and delineating brain tumors from MRI images using artificial intelligence presents a complex challenge in medical AI. Recent progress has seen a variety of techniques employed to assist medical professional...
详细信息
暂无评论