scholarly journals Star Identification Based on Multilayer Voting Algorithm for Star Sensors

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3084
Author(s):  
Meiying Liu ◽  
Xin Wei ◽  
Desheng Wen ◽  
Hu Wang

This paper describes the multilayer voting algorithm, a novel autonomous star identification method for spacecraft attitude determination. The proposed algorithm includes two processes: an initial match process and a verification process. In the initial match process, a triangle voting scheme is used to acquire candidates of the detected stars, in which the triangle unit is adopted as the basic voting unit. During the identification process, feature extraction is implemented, and each triangle unit is described by its singular values. Then the singular values are used to search for candidates of the imaged triangle units, which further improve the efficiency and robustness of the algorithm. After the initial match step, a verification method is applied to eliminate incorrect candidates from the initial results and then outputting the final match results of the imaged stars. Experiments show that our algorithm has more robustness to position noise, magnitude noise, and false stars than the other three algorithms, the identification speed of our algorithm is largely faster than the geometric voting algorithm and optimized grid algorithm. However, it takes more memory, and SVD also seems faster.

Author(s):  
Reno Renaldi Tibyan ◽  
Dermawan Wibisono ◽  
Mursyid Hasan Basri

Purpose – This paper aims to discuss the verification process of the theoretical concepts of the proposed performance management (PM) framework in practice. Design/methodology/approach – A case study based on a focus group discussion (FGD) method is used to describe the application a PM framework and the implementation of a PM system in a case organisation. Findings – The findings show that the case organisation has been applying the Balanced Scorecard framework and show that it needs to add some important aspects to the framework to support the better implementation of its PM system. Research limitations/implications – This paper is based on a single case study due to the need for an effective FGD in a selected organisation. Originality/value – The study drives the development of PM research in the use of a theoretical verification method to confirm the application of the theoretical concepts of PM framework in practice.


Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3684
Author(s):  
David Rijlaarsdam ◽  
Hamza Yous ◽  
Jonathan Byrne ◽  
Davide Oddenino ◽  
Gianluca Furano ◽  
...  

The required precision for attitude determination in spacecraft is increasing, providing a need for more accurate attitude determination sensors. The star sensor or star tracker provides unmatched arc-second precision and with the rise of micro satellites these sensors are becoming smaller, faster and more efficient. The most critical component in the star sensor system is the lost-in-space star identification algorithm which identifies stars in a scene without a priori attitude information. In this paper, we present an efficient lost-in-space star identification algorithm using a neural network and a robust and novel feature extraction method. Since a neural network implicitly stores the patterns associated with a guide star, a database lookup is eliminated from the matching process. The search time is therefore not influenced by the number of patterns stored in the network, making it constant (O(1)). This search time is unrivalled by other star identification algorithms. The presented algorithm provides excellent performance in a simple and lightweight design, making neural networks the preferred choice for star identification algorithms.


2012 ◽  
Author(s):  
Wen-jun Yi ◽  
Hai-bo Liu ◽  
Jian-kun Yang ◽  
Hui Jia ◽  
Li-xin Yang

2016 ◽  
Vol 2016 ◽  
pp. 1-9
Author(s):  
DaeYoub Kim

To solve various problems of the Internet, content centric networking (CCN), one of information centric networking architectures (ICN), provides both an in-network content caching scheme and a built-in content verification scheme. However, a user is still asked to generate many request messages when retrieving fragmented content through CCN. This model can seriously increase the amount of network traffic. Furthermore, when receiving content, a user is asked to verify the received content before using it. This verification process can cause a serious service delay. To improve such inefficiencies, this paper proposes a transmission process to handle request messages at one time. Also, it suggests an efficient content verification method using both hash chains and Merkel-hash tree.


1997 ◽  
Vol 33 (1) ◽  
pp. 202-213 ◽  
Author(s):  
C. Padgett ◽  
K. Kreutz-Delgado

Sign in / Sign up

Export Citation Format

Share Document