[go: up one dir, main page]

CN110823228B - Path generation method and device - Google Patents

Path generation method and device Download PDF

Info

Publication number
CN110823228B
CN110823228B CN201911130105.8A CN201911130105A CN110823228B CN 110823228 B CN110823228 B CN 110823228B CN 201911130105 A CN201911130105 A CN 201911130105A CN 110823228 B CN110823228 B CN 110823228B
Authority
CN
China
Prior art keywords
path
sub
node
target
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911130105.8A
Other languages
Chinese (zh)
Other versions
CN110823228A (en
Inventor
尹全军
焦鹏
鞠儒生
谢旭
许凯
胡越
曾云秀
胡聪
王鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201911130105.8A priority Critical patent/CN110823228B/en
Publication of CN110823228A publication Critical patent/CN110823228A/en
Application granted granted Critical
Publication of CN110823228B publication Critical patent/CN110823228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/20Instruments for performing navigational calculations
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/26Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
    • G01C21/34Route searching; Route guidance
    • G01C21/3453Special cost functions, i.e. other than distance or default speed limit of road segments

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Automation & Control Theory (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a path generation method and a path generation device, and on the first hand, nodes in a path obtained by planning on a zoom image are mapped into a sub-target graph, so that more details related to a deceptive path are reserved in the sub-target graph, path planning is carried out in the sub-target graph, the distortion condition is reduced, and the path planning accuracy is improved. In a second aspect, path planning is performed in the zoomed image and the sub-target image, which reduces the amount of computation compared to path planning in the original image. In a third aspect, the way of generating the sub-target graph is as follows: the convex corners in the original drawing are taken as the sub-targets, and the sub-targets meeting the preset conditions are connected, so that the calculation amount is small, and the calculation amount is further reduced.

Description

Path generation method and device
Technical Field
The present invention relates to the field of path planning technologies, and in particular, to a method and an apparatus for generating a path.
Background
The path planning means that a collision-free path from a starting node to a target node is searched in an environment with obstacles according to a certain evaluation standard. For example, optimal path planning needs to plan a path that consumes the least resources, and for example, deceptive path planning needs to plan a path that consumes more time or other resources of the other party, or plan a path that makes it difficult for the other party to determine a real path.
Existing path planning schemes generally include: the method comprises the steps of carrying out image acquisition aiming at a geographical area needing path planning, marking terrain conditions such as a starting node, a target node, a mountain, a plain and the like in the acquired image, and planning a path between the starting node and the target node based on the terrain conditions.
If the area of the geographic area is large, the original image is generally reduced in equal proportion, and a path is planned in the reduced image. However, in the process of scaling down, details of the original image are lost, distortion is easily caused, and the accuracy of the planned path is poor.
Disclosure of Invention
In view of the above, the present invention provides a method and an apparatus for path generation to reduce distortion and improve accuracy of path planning.
Based on the above object, the present invention provides a path generating method, including:
acquiring an image to be processed;
zooming the image to be processed to obtain a zoomed image;
performing path planning on the zoomed image to obtain a first path;
generating a sub-target map of the image to be processed as a first sub-target map; wherein, the sub-target map is: in the original drawing, convex corners in the original drawing are taken as sub-targets, and the sub-targets meeting preset conditions are connected to form a drawing;
mapping nodes in the first path to the first sub-target graph to obtain first path points in the first sub-target graph;
determining a node which meets a preset condition with the first path point in the first sub-target graph;
generating a sub-target graph of the first sub-target graph as a second sub-target graph based on the determined nodes and the first path points;
and planning a path on the second sub-target map to obtain a target path.
Optionally, the performing path planning on the zoomed image to obtain a first path includes:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the zoomed image;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the first path, wherein the deception path takes the starting node as a starting point.
Optionally, the preset conditions are: in the parallelogram formed by the two nodes, no obstacles and other sub-targets exist.
Optionally, the performing path planning on the second sub-target map to obtain a target path includes:
performing path planning on the second sub-target graph to obtain a second path;
mapping the nodes in the second path to the image to be processed to obtain second path points in the image to be processed;
and performing deception path planning on the image to be processed based on the second path point to obtain the target path.
Optionally, the performing path planning on the second sub-target map to obtain a second path includes:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the second sub-target graph;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the second path, wherein the deception path takes the starting node as a starting point.
Based on the above object, the present invention further provides a path generating apparatus, including:
the acquisition module is used for acquiring an image to be processed;
the zooming module is used for zooming the image to be processed to obtain a zoomed image;
the first planning module is used for planning a path on the zoom image to obtain a first path;
the first generation module is used for generating a sub-target map of the image to be processed as a first sub-target map; wherein, the sub-target map is: in the original drawing, convex corners in the original drawing are taken as sub-targets, and the sub-targets meeting preset conditions are connected to form a drawing;
a mapping module, configured to map a node in the first path to the first sub-target graph to obtain a first path point in the first sub-target graph;
a determining module, configured to determine, in the first sub-target graph, a node that meets a preset condition with the first path point;
a second generating module, configured to generate a sub-target map of the first sub-target map as a second sub-target map based on the determined node and the first path point;
and the second planning module is used for planning a path on the second sub-target map to obtain a target path.
Optionally, the first planning module is specifically configured to:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the zoomed image;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the first path, wherein the deception path takes the starting node as a starting point.
Optionally, the preset conditions are: in the parallelogram formed by the two nodes, no obstacles and other sub-targets exist.
Optionally, the second planning module includes:
the first planning submodule is used for planning a path on the second sub-target map to obtain a second path;
the mapping submodule is used for mapping the nodes in the second path to the image to be processed to obtain second path points in the image to be processed;
and the second planning submodule is used for carrying out deception path planning on the image to be processed based on the second path point to obtain the target path.
Optionally, the first planning sub-module is specifically configured to:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the second sub-target graph;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the second path, wherein the deception path takes the starting node as a starting point.
By applying the embodiment of the invention, on the first hand, the nodes in the path planned on the zoom image are mapped to the sub-target graph, so that more details related to the deceptive path are reserved in the sub-target graph, the path planning is carried out in the sub-target graph, the distortion is reduced, and the accuracy of the path planning is improved. In a second aspect, path planning is performed in the zoomed image and the sub-target image, which reduces the amount of computation compared to path planning in the original image. In a third aspect, the way of generating the sub-target graph is as follows: the convex corners in the original drawing are taken as the sub-targets, and the sub-targets meeting the preset conditions are connected, so that the calculation amount is small, and the calculation amount is further reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a path generation method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a path generating device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In order to achieve the above object, embodiments of the present invention provide a method and an apparatus for generating a path, which may be applied to various electronic devices, and are not limited specifically. First, a path generation method provided by an embodiment of the present invention will be described in detail.
Fig. 1 is a schematic flow chart of a path generation method provided in an embodiment of the present invention, including:
s101: and acquiring an image to be processed.
For example, image acquisition may be performed for a geographic area in which path planning is required, and the acquired image is referred to as an image to be processed. The image may be a map, a grid map, etc., and the specific image format is not limited.
S102: and zooming the image to be processed to obtain a zoomed image.
For example, the image to be processed may be scaled equally, such as discretizing the image to be processed into a grid map D, and then scaling D by equal-scale k times to the scaled image DminiK can be 2, 3, etc., and the specific value can be set according to actual conditions.
S103: and planning a path on the zoomed image to obtain a first path.
For example, the path planning in S103 may be an optimal path planning, a deceptive path planning, and the like, which is not limited specifically. Taking the spoofed path plan as an example, in one embodiment, S103 may include:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the zoomed image;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the first path, wherein the deception path takes the starting node as a starting point.
For example, a real target node may be understood as a real end point of a path, and a preset dummy target node may be understood as a dummy end point for confusing a recognizer. When a deception path needs to be generated, an initial node and a real target node are known; a false target node may be preset based on actual geographic conditions.
Generally, the generated fraud path is located in an area, which may be a city, a province, or other administrative area, or the area where the fraud path is located may be preset based on actual geographic conditions. The area is divided into a plurality of intermediate nodes, for example, the area may be uniformly divided into one node every 1 km, and the nodes are intermediate nodes, or the intermediate nodes may be understood as the minimum unit of division in the area. Because the plan of the scheme is a deception path instead of an optimal path, each position in the area is possible to be a node between the starting node and the real target node in the deception path, and therefore, the minimum units in the area can be used as intermediate nodes.
The shortest path planning model and the identification party behavior model are obtained in advance, and the specific obtaining mode is not limited.
In one embodiment, the posterior probability distribution may be calculated using the following equation:
Figure BDA0002278056350000061
Figure BDA0002278056350000062
wherein P (G | O) represents the posterior probability distribution, G represents the candidate node set, O represents an observation sequence corresponding to a given observation situation, α represents a normalization factor, β represents a preset constant, β is greater than 0, s represents the start node, G represents the real target node and the preset false target node, costdifRGRepresents the difference in the intended cost, optc represents the optimal cost from s to g for the identified person's behavior to be consistent with observation O,
Figure BDA0002278056350000063
representing the optimal cost from s to g for the identified person's behavior not consistent with observation O. The intent is also the possible target nodes, including the real target node and the pre-set dummy target node.
In the present embodiment, the posterior probability of an intention can be defined based on the cost difference (cost difference) with which the person to be identified realizes the intention under two conditions: one is the cost of the identified person's behavior being consistent with the observation, and the other is the cost of the inconsistency, see equation 2 above.
The smaller the cost difference, the greater the probability that the intent is a true intent, so a probability distribution over a set of possible intents (a set of candidate nodes) can be generated by comparing the cost differences of different intents. For example, Boltzmann distribution (Boltzmann distribution) assumptions can be employed, namely:
Figure BDA0002278056350000072
from this, the posterior probability distribution of the possible intention set (candidate node set) can be obtained by the above equations 1 and 2.
Alternatively, in another embodiment, the cost difference between the two optimal paths for each intent, compliant and non-compliant (or partially non-compliant) observations, which reflects the intent uncertainty of each node, may be determined separately. In this embodiment, the a posteriori probability distribution is denoted as P (G | N), N comprising the start node s, the set of candidate nodes G and intermediate nodes,
Figure BDA0002278056350000071
Y=costdifMS(s,g,n);
Figure BDA0002278056350000073
wherein P (G | N) represents the posterior probability distribution, N includes the start node s, the candidate node set G and the intermediate node, α represents a normalization factor, β represents a predetermined constant, β is greater than 0, costdifMsA cost difference representing an intention, s represents the starting node, g represents the real target node and the preset fake target node, n represents a position where the identified party is observed recently, and n is o|o|And O represents the observation sequence corresponding to a given observation scenario.
costdifRGAnd costdifMSRespectively representing the cost difference of intentions calculated by different algorithms, and the corner mark RG and the corner mark MS can be understood as different algorithm identifications.
In this embodiment, the path planning problem field may be defined as a triplet D<N,E,c>Where N is a non-empty set of nodes, N includes a start node s, a candidateA node set G and intermediate nodes;
Figure BDA0002278056350000074
e is the set of edges between nodes; c represents the specific cost of passing each edge.
In the path planning problem domain, path pi is expressed as node order pi ═ no,n1……nkSo that for each node i ∈ 0, 1 … … k-1; (n)i,ni+1)∈E。πiRepresenting the ith node of path pi. | π | represents the path length, and likewise the number of edges in path π, π|π|=nk. The cost of path pi is the cost of passing all edges, i.e.
Figure BDA0002278056350000081
The set of all paths is defined as pi, all starting from node pi0=n1Terminates at pi|π|=n2Has a path set of pi (n)1,n2)。
A path planning problem may be defined as a < D, s, g > triplet, where D is < N, E, c >, D is the path planning problem domain, s belongs to N, s represents the start node, g belongs to N, and g represents the target node (real target node).
The solution or solution path of the path planning problem is the corresponding problem domain D, which satisfies pi0S and pi|π|G-path pi. The set of these path solutions is Π (s, g). The optimal path is the least costly path of all solution paths. The optimal cost between two nodes is the optimal path cost between the two nodes, node niTo njIs defined as optc (n)i,nj). The optimal path may be determined using the a-star algorithm (a-star algorithm, a direct search method for solving shortest paths in static road networks).
Taking fraud into account in path planning, it can be understood that there is some hostile observer trying to learn the path trend. The probabilistic intent recognition problem, i.e., tuple, in the path planning problem domain is given below<D,G,s,O,Prob>WhereinD is the problem domain of the path planning,
Figure BDA0002278056350000083
represents an intention set, i.e. a set of candidate nodes, s ∈ N, s represents a start node, O ═ O1……omE N, where m is greater than 0, O represents the observation sequence, and Prob represents the prior probability of the target node, which can be assumed to be equiprobable.
Probability distribution of intent G: pr (G | O) is the solution to the above problem, representing the probability that G ∈ G is the true target given the observation sequence O. grE G represents the true intention of the identified party, or GrRepresenting the real target node, and determining the quality of the solution according to whether the solution can be applied to all the G e G/GrGuarantee Pr (g) inrO) is equal to or greater than Pr (g | O).
The deceptive path plan attempts to minimize the probability that its true target node is identified.
A Deceptive Path Planning (DPP) problem can be represented as a tuple<<D,s,gr>,G,P>Wherein:
<D,s,gr>representing a path planning problem, in which D ═<N,E,c>D is the path planning problem domain, s belongs to N, s represents the starting node,
Figure BDA0002278056350000082
representing an intention set, i.e. a candidate node set, P (G | O.n) representing the posterior probability of the target nodes (true target nodes and pre-set false target nodes) given the observation sequence O, P representing the shortest path planning model and the identifier behavior model described above.
Spoofing is a "distortion of perceived reality" and has two implementations: "fake representation" and "hidden truth", also known as "negation" and "spoofing", wherein fake representation can be understood as: giving the viewer an impression of moving to other objects; the Tibetan language can be understood as follows: obscuring the planner's true goals.
The solution of the DPP problem is planned to obtain a path with deceptive performance, and the quality of the solution can be measured by three different indexes of magnitude, density and degree.
A step in the path is true (true step), if and only if, at the node, the true target probability grGreater than the probability of other possible target points, i.e. all G ∈ G \ Gr},P(gr|O.n)>P (g | O.n). Otherwise the step is fraudulent.
When the probability of a certain false target node is strictly greater than that of a real target node grProbability is false (Simulation) spoofing. Namely, the existence of G epsilon G \ GrAre such that P (g)r|O.n)<P(g|O.n)。
The pseudo-nature can be quantitatively described in terms of the degree to which a false target node dominates a true target node. The higher the dominance, the stronger the false fraud.
Figure BDA0002278056350000091
Where O denotes an observation sequence corresponding to a given observation situation, n denotes a position at which the identified party was most recently observed, and n ═ O|o|,grRepresenting the true target node, and P (G | O) representing the posterior probability distribution. The simulation (O.n) represents the spoofing magnitude corresponding to location n and derived based on the spoofing policy. n can be understood as a point location, and an intermediate node can also be understood as a point location, and the intermediate node is corresponding to n, so that the deception magnitude of the intermediate node is obtained.
If the fake spoofing strategy is successful, the identification party can only deploy the resource to the wrong position.
When the target node g is realrWhen the difference between the probability of (1) and the probability of other false target nodes is less than a certain threshold value tau, the method is a hidden true (fraud). Namely, the existence of G epsilon G \ GrIs made | P (g)r|O.n)-P(g|O.n)|<τ。
Strict spoofing occurs when τ is equal to 0, meaning that there is a false target node whose recognition probability is consistent with the probability of a true target node. Since this occurs only a few times in the probabilistic model, it may allow for spoofing to occur within an acceptable interval, e.g., the posterior recognition probability of a real target is not dominant over other false targets. Genuine fraud can be described quantitatively using Shannon's entropy:
Figure BDA0002278056350000101
the dismembership (O.n) indicates the magnitude of spoofing based on the hidden-truth policy corresponding to location n. n can be understood as a point location, and an intermediate node can also be understood as a point location, and the intermediate node is corresponding to n, so that the deception magnitude of the intermediate node is obtained.
If the hidden-truth strategy is successful, the identification party cannot judge the deployment position of the resource due to the fact that different intents have similar posterior probabilities. At this point, the identifying party will make a decision under the assumption that there is no observed information.
In an embodiment, the evaluating the spoofing magnitude of the intermediate node based on the pseudo-indicative policy and the posterior probability distribution may specifically include:
using equation 5, the spoofing magnitude of the intermediate node is evaluated:
Figure BDA0002278056350000102
in another embodiment, the evaluating the spoofing magnitude of the intermediate node based on the hidden-truth policy and the posterior probability distribution may specifically include:
using equation 6, the spoofing magnitude of the intermediate node is evaluated:
Figure BDA0002278056350000103
in another embodiment, the evaluating the spoofing magnitude of the intermediate node based on the fake and hidden policies and the posterior probability distribution may specifically include:
Figure BDA0002278056350000104
where O denotes an observation sequence corresponding to a given observation situation, n denotes a position at which the identified party was most recently observed, and n ═ O|o|,grRepresents the real target node, P (g)iL O.n) represents the posterior probability distribution, G represents the candidate node set, simulation represents the deception magnitude obtained based on the pseudo-representation strategy, and dispulation represents the deception magnitude obtained based on the hidden-truth strategy, and omega1Representing a preset first weight value, ω2Indicating a preset second weight value. Omega1And ω2The specific value of (c) can be set according to actual conditions, but ω is required1+ω2At 1, combi indicates the magnitude of spoofing based on the fake and hidden-genuine policies.
combi (O.n) indicates the spoofing magnitude corresponding to location n based on the spoofing and hiding policies. n can be understood as a point location, and an intermediate node can also be understood as a point location, and the intermediate node is corresponding to n, so that the deception magnitude of the intermediate node is obtained.
Depending on the subjective intensity of the intended concealment or fraud, people often mix both false and false-hiding effects in their behavior. In this embodiment, a comprehensive strategy is proposed: when the target node g is realrIs not greater than the sum of the identification probability of other false target nodes and the threshold τ, it is a Combination, i.e., a Combination of false and true representation. Namely, the existence of G epsilon G \ GrIs made | P (g)r|O.n)≤τ+P(g|O.n)|。
This strategy quantification is described as a linear combination of the explicit and implicit strategies, with reference to equation 7 above. Compared with a fake showing strategy and a real hiding strategy, the comprehensive strategy is more flexible and comprehensive, and not only can express a fake intention, but also can hide a real intention.
Spoofing in path planning can be achieved by maximizing the area of the parcel under its magnitude curve:
Figure BDA0002278056350000111
for a discrete scene, equation 8 may be expressed as:
Figure BDA0002278056350000112
where i denotes a node in the path, Δ L denotes the length of the time slice, and t denotes the time.
Based on the similar idea of equation 9, a deception maximization model based on deception magnitude is introduced below, which is denoted as MDM-P, and in the model solving process, the following assumed conditions exist: the outcome of the action is deterministic; for both parties to be identified, the behavioral model is observable; the rogue is rational in the rogue path planning.
The mathematical form of the model is:
the problems are as follows: in a directed network N along the s-grPaths resource-constrained maximize magnitude expectations of spoofing; the directed network N can be understood as the area where the generated spoofed path is located.
Parameters are as follows: i e N, i denotes a node in the network (including the start node s, G ═ G { (G))r、g1……g|G|-1G denotes a candidate node set, GrAnd representing a real target node, wherein other nodes in the G are preset false target nodes, k ∈ E represents an edge in the network, j represents another node in the network, k ∈ FS (i) represents an edge-out set of the node i, and k ∈ RS (i) represents an edge-out set of the node i.
Data: magkRepresents a value of the spoofing level on edge k, - ∞ < magkLess than + ∞; rk is greater than 0, and rk represents the resources required by the passing edge k, namely the initial length of the edge; r represents s-grTotal amount of resources available for the path.
Variables are as follows: if edge k is passed, xk1, otherwise xk=0。
The magnitude-based deception maximization model is:
Figure BDA0002278056350000121
(objective function);
Figure BDA0002278056350000122
wherein X { X ∈ { (0, 1}|E||rTx ≦ R }, and equation 10 may be understood as a constraint. The rogue (identified party) follows a path s-g under a resource constraint RrMaximizing the expected magnitude of spoofing. The objective function of MDM-P can be understood as: with the spoof magnitude being a function of the target maximum.
In the field of path planning, edges in the network can be regarded as actions, and therefore in the above model, the spoofing magnitude of the edge k ═ i, j is the same as that of the node j, so that the spoofing magnitude defined on the node can be converted to the edge or the action in the network. The constraint condition is flow balance constraint, and ensures that the path generated by optimization starts from a node s to a node grAnd (6) terminating. In addition, the constraint conditions also guarantee the set N \ s, g1……gmThe access of node i in } is the same as the number of leaves.
The advantages of applying the above model MDM-P are the following: the deception on each node is described quantitatively by using the magnitude index, and a common calculation basis is provided for subsequent different deception strategies, so that the adaptability of the model under different scenes is expanded; second, defining spoofed magnitude on the nodes allows spoofed paths to be planned in a global fashion over the complete network.
Two other models, MDM-P1 and MDM-P2, are presented below:
wherein, the MDM-P1 may be:
Figure BDA0002278056350000131
(objective function);
the constraint condition refers to equation 10 above. The objective function of the MDM-P model only requires maximization of the expected magnitude, but the constraint (equation 10) cannot guarantee that the edges generated by optimization are connected with the complete path. And the MDM-P1 can solve the problem by reconstructing the MDM-P as a dual-target optimization problem.
The MDM-P2 may be:
Figure BDA0002278056350000132
(objective function);
the constraint condition refers to equation 10 above. MDM-P2 also solves the problems described above with MDM-P.
And the optimization complexity of the MDM-P2 model is lower than that of the MDM-P1 model, the calculation amount of the MDM-P2 model is low, and the efficiency is high.
The objective functions of MDM-P1 and MDM-P2 can be understood as: the maximum spoof magnitude and the longest path are the functions of the target.
The calculation results of the MDM-P, MDM-P1 model, the MDM-P2 model and the like are optimized variables X, wherein the non-zero elements in X represent the edges passed by the cheater, and the edges form a cheating path, so the edges are called candidate sub-paths.
The candidate sub-paths obtained by the hypothesis solution form a set E'. If no loop exists, the starting node s and the real target node g are givenrA deception path can be generated in an end-to-end mode; for example, let E { (s, n)1),(n1,n2),(n2,gr) Is s → n, the corresponding path is s → n1→n2→gr
However, loops exist in most of the deceptive paths, and in one embodiment, the loops combined by the candidate sub-paths can be identified based on preset loop conditions; and generating a deception path consisting of candidate sub-paths based on the starting node, the real target node and the identified loop.
In one embodiment, all sequential combinations of edges that may cover the set E' may be traversed. For example, let E { (s, n)1),(n1,n3),(n1,n2),(n2,n1),(n3,gr) Get the path s → n by traversing all possible sequential combinations of edges1→n2→n1→n3→gr. However, if multiple loops exist in the spoofing path, the complexity is high by using the traversal method.
The inventors found that the presence of a loop satisfies the following condition:
fs(s) | - | rs(s) | 1, and | fs(s) | > 1; or
|FS(gr)|-|RS(gr) 1 and RS (g)r) I > 1; or
Figure BDA0002278056350000133
Fs (i) | rs (i) | > 1, where N 'is the set of nodes where the edge set E' appears.
Nodes satisfying the above conditions may be identified, and included in the set N ", that is, the nodes in N" are located in the loop of the spoof path.
Because i belongs to N' \ { gr}, | fs (i) | 2, and i ═ grWhen | fs (i) | is 1, there always exists an edge j ∈ fs (i), and the end node of the edge has a path returning to the node i; thus, for node i ∈ N "\ { g }rThere is always | fs (i) | -1 (or i ═ g }r,i,grIf the path belongs to N, | FS (i) |), i is returned from the end node of the edge e ∈ FS (i).
In one embodiment, when encountering node i ∈ N ″, it may first find a traversable path from the end node of an edge in the set fs (i) to node i, add the covered edges on the paths into the ordered edge set, and loop this step until there is no element in fs (i) that can return to node i.
For example, the loop formed by the combination of candidate sub-paths may be identified as follows:
suppose given original road network D ═<N,E,c>An initial node s and a real target node grAnd in the case of the candidate node set G, a spoofed path with a loop is identified from the optimization result X. Firstly, the methodAnd extracting the sub-net D '═ (N', E ', c') from the D and the X, and initializing the ordered edge set Path. The recognition process is terminated when all edges in the set E' are added to Path. For nodes not on the path with loop path, add them to Pat in an end-to-end manner. And for the nodes on the loop, generating all Path tracks starting from the end node j of a certain edge of FS (temp) according to the judgment of the conditions, and adding the set coverEdgeSet of the track covering edge into the Path. For both cases (nodes not on the looped path trace and nodes on the loop), two additional steps need to be performed: first, delete from set E' already covering the edge; second, temp is located to the new node.
Thus, a finally generated spoofed path is obtained, and for the purpose of description differentiation, the spoofed path is referred to as a first pathmini
S104: generating a sub-target map of the image to be processed as a first sub-target map; wherein, the sub-target map is: in the original drawing, convex corners in the original drawing are used as sub-targets, and the sub-targets meeting preset conditions are connected to form the drawing.
For example, the preset condition can be understood as a Direct-h-reachable attribute, that is: in the parallelogram formed by the two nodes, no obstacles and other sub-targets exist. S103 may include, in processing the image, determining convex corners as sub-targets, and connecting the sub-targets satisfying the Direct-h-reachable attribute to obtain a first sub-target map DSSG
S105: and mapping the nodes in the first path to the first sub-target graph to obtain first path points in the first sub-target graph.
The first path obtained in S103miniIs mapped to the first sub-target graph DSSGFor convenience of description, the mapped point is referred to as a first path point.
S106: and in the first sub-target graph, determining nodes meeting preset conditions with the first path point.
For example, the preset condition can be understood as a Direct-h-reachable attribute, that is: in the parallelogram formed by the two nodes, no obstacles and other sub-targets exist.
S107: and generating a sub-target graph of the first sub-target graph as a second sub-target graph based on the determined nodes and the first path points.
For example, the node determined in S106 may be connected to the first path point in the first sub-target graph, so as to obtain a new sub-target graph D'SSGFor differentiating description, D'SSGReferred to as the second sub-target map.
S108: and planning the path on the second sub-target map to obtain the target path.
Planning the path on the second sub-target graph, and for distinguishing description, referring the obtained path as the second pathssg(ii) a In one embodiment, the second path may be directly used as the target path, that is, the path planning result of the present solution.
In another embodiment, a node in the second path may be mapped to the image to be processed to obtain a second path point in the image to be processed; and performing deception path planning on the image to be processed based on the second path point to obtain the target path.
In the present embodiment, the second path is usedssgThe node in (b) is mapped back to the original image (i.e., the image to be processed in S101), and for convenience of description, the mapped point is referred to as a second path point. And in the original image, carrying out deception path planning based on the second path point, and finally connecting the deception path points end to obtain a target path, namely a path planning result of the scheme.
For example, the path planning in S108 may be an optimal path planning, a deceptive path planning, and the like, which is not limited specifically. Taking the spoofed path plan as an example, in one embodiment, S108 may include:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the second sub-target graph;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the second path, wherein the deception path takes the starting node as a starting point.
The spoofed path planning has already been described in detail in the foregoing, and is not described in detail here.
By applying the embodiment of the invention, the nodes in the path obtained by planning on the zoom image are mapped into the sub-target graph, so that more details related to the deceptive path are reserved in the sub-target graph, the path planning is carried out in the sub-target graph, the distortion condition is reduced, and the path planning accuracy is improved.
In some existing schemes, if the area of the geographic area is large, in order to reduce the distortion, path planning is directly performed on the original image acquired for the geographic area, so that the calculation amount is large. In the scheme, on the first hand, path planning is carried out in the zoomed image and the sub-target image, and compared with the path planning carried out in the original image, the calculation amount is reduced; in a second aspect, the way of generating the sub-target graph is as follows: the convex corners in the original drawing are taken as the sub-targets, and the sub-targets meeting the preset conditions are connected, so that the calculation amount is small, and the calculation amount is further reduced.
Corresponding to the foregoing method embodiment, an embodiment of the present invention further provides a path generating apparatus, as shown in fig. 2, including:
an obtaining module 201, configured to obtain an image to be processed;
a scaling module 202, configured to scale the image to be processed to obtain a scaled image;
a first planning module 203, configured to perform path planning on the zoomed image to obtain a first path;
a first generating module 204, configured to generate a sub-target map of the image to be processed as a first sub-target map; wherein, the sub-target map is: in the original drawing, convex corners in the original drawing are taken as sub-targets, and the sub-targets meeting preset conditions are connected to form a drawing;
a mapping module 205, configured to map a node in the first path to the first sub-target graph, so as to obtain a first path point in the first sub-target graph;
a determining module 206, configured to determine, in the first sub-target graph, a node that meets a preset condition with the first path point;
a second generating module 207, configured to generate a sub-target map of the first sub-target map as a second sub-target map based on the determined node and the first path point;
and the second planning module 208 is configured to perform path planning on the second sub-target map to obtain a target path.
As an embodiment, the first planning module 203 is specifically configured to:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the zoomed image;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the first path, wherein the deception path takes the starting node as a starting point.
As an embodiment, the preset condition is: in the parallelogram formed by the two nodes, no obstacles and other sub-targets exist.
As an embodiment, the second planning module 208 includes: a first planning submodule, a mapping submodule, and a second planning submodule (not shown), wherein,
the first planning submodule is used for planning a path on the second sub-target map to obtain a second path;
the mapping submodule is used for mapping the nodes in the second path to the image to be processed to obtain second path points in the image to be processed;
and the second planning submodule is used for carrying out deception path planning on the image to be processed based on the second path point to obtain the target path.
As an embodiment, the first planning submodule is specifically configured to:
determining an initial node, a real target node, a preset false target node and a plurality of intermediate nodes on the second sub-target graph;
based on a shortest path planning model and a recognition party behavior model, obtaining posterior probability distribution of a candidate node set under a given observation situation at each intermediate node position, wherein the candidate node set comprises the real target node and a preset false target node;
evaluating the deception magnitude of the intermediate node based on the posterior probability distribution;
solving candidate sub-paths under a preset objective function according to the deception magnitude of the intermediate node;
and combining the candidate sub-paths into a deception path as the second path, wherein the deception path takes the starting node as a starting point.
The apparatus of the foregoing embodiment is used to implement the corresponding method in the foregoing embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the idea of the invention, also features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity.
In addition, well known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures for simplicity of illustration and discussion, and so as not to obscure the invention. Furthermore, devices may be shown in block diagram form in order to avoid obscuring the invention, and also in view of the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the present invention is to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the invention, it should be apparent to one skilled in the art that the invention can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present invention has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The embodiments of the invention are intended to embrace all such alternatives, modifications and variances that fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements and the like that may be made without departing from the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (10)

1.一种路径生成方法,其特征在于,包括:1. a path generation method, is characterized in that, comprises: 获取待处理图像;Get the image to be processed; 对所述待处理图像进行缩放,得到缩放图像;zooming the to-be-processed image to obtain a zoomed image; 在所述缩放图像上进行路径规划,得到第一路径;Perform path planning on the zoomed image to obtain a first path; 生成所述待处理图像的子目标图,作为第一子目标图;其中,子目标图为:在所述待处理图像中,以所述待处理图像中的凸角落为子目标,并将满足预设条件的子目标相连接形成的图;A sub-target map of the image to be processed is generated as the first sub-target map; wherein, the sub-target map is: in the image to be processed, the convex corner in the image to be processed is taken as a sub-target, and will satisfy the A graph formed by connecting sub-goals of preset conditions; 将所述第一路径中的节点映射至所述第一子目标图,得到所述第一子目标图中的第一路径点;mapping the nodes in the first path to the first sub-goal graph to obtain a first path point in the first sub-goal graph; 在所述第一子目标图中,确定与所述第一路径点之间满足预设条件的节点;In the first sub-goal graph, determine a node that satisfies a preset condition with the first path point; 基于所确定的节点和所述第一路径点,生成所述第一子目标图的子目标图,作为第二子目标图;Based on the determined node and the first path point, a sub-goal graph of the first sub-goal graph is generated as a second sub-goal graph; 在所述第二子目标图上进行路径规划,得到目标路径。Perform path planning on the second sub-goal graph to obtain a target path. 2.根据权利要求1所述的方法,其特征在于,所述在所述缩放图像上进行路径规划,得到第一路径,包括:2. The method according to claim 1, wherein the performing path planning on the zoomed image to obtain the first path comprises: 在所述缩放图像上,确定起始节点、真实目标节点、预设虚假目标节点和多个中间节点;On the zoomed image, determine a starting node, a real target node, a preset false target node and a plurality of intermediate nodes; 基于最短路径规划模型和识别方行为模型,获取给定观测情形下的候选节点集合在每个中间节点位置处的后验概率分布,所述候选节点集合包括所述真实目标节点和预设虚假目标节点;Based on the shortest path planning model and the behavior model of the recognizer, obtain the posterior probability distribution of the candidate node set at the position of each intermediate node under a given observation situation, where the candidate node set includes the real target node and the preset false target node; 基于所述后验概率分布,评估中间节点的欺骗量级;assessing the magnitude of deception of the intermediate node based on the posterior probability distribution; 根据中间节点的欺骗量级,求解预设目标函数下的候选子路径;According to the deception magnitude of the intermediate node, solve the candidate sub-path under the preset objective function; 将所述候选子路径组合成欺骗路径,作为所述第一路径,所述欺骗路径以所述起始节点为起始点。Combining the candidate sub-paths into a spoofed path as the first path, the spoofed path takes the starting node as a starting point. 3.根据权利要求1所述的方法,其特征在于,所述预设条件为:两个节点构成的平行四边形内,不存在障碍物及其他子目标。3 . The method according to claim 1 , wherein the preset condition is: there are no obstacles and other sub-targets in a parallelogram formed by two nodes. 4 . 4.根据权利要求1所述的方法,其特征在于,所述在所述第二子目标图上进行路径规划,得到目标路径,包括:4. The method according to claim 1, wherein the performing path planning on the second sub-goal graph to obtain a target path, comprising: 在所述第二子目标图上进行路径规划,得到第二路径;Perform path planning on the second sub-goal graph to obtain a second path; 将所述第二路径中的节点映射至所述待处理图像中,得到所述待处理图像中的第二路径点;mapping the nodes in the second path to the image to be processed to obtain a second path point in the image to be processed; 在所述待处理图像上,基于所述第二路径点进行欺骗路径规划,得到所述目标路径。On the to-be-processed image, deception path planning is performed based on the second path point to obtain the target path. 5.根据权利要求4所述的方法,其特征在于,所述在所述第二子目标图上进行路径规划,得到第二路径,包括:5. The method according to claim 4, wherein the performing path planning on the second sub-goal graph to obtain the second path, comprising: 在所述第二子目标图上,确定起始节点、真实目标节点、预设虚假目标节点和多个中间节点;On the second sub-target graph, determine a starting node, a real target node, a preset false target node and a plurality of intermediate nodes; 基于最短路径规划模型和识别方行为模型,获取给定观测情形下的候选节点集合在每个中间节点位置处的后验概率分布,所述候选节点集合包括所述真实目标节点和预设虚假目标节点;Based on the shortest path planning model and the behavior model of the recognizer, obtain the posterior probability distribution of the candidate node set at the position of each intermediate node under a given observation situation, where the candidate node set includes the real target node and the preset false target node; 基于所述后验概率分布,评估中间节点的欺骗量级;assessing the magnitude of deception of the intermediate node based on the posterior probability distribution; 根据中间节点的欺骗量级,求解预设目标函数下的候选子路径;According to the deception magnitude of the intermediate node, solve the candidate sub-path under the preset objective function; 将所述候选子路径组合成欺骗路径,作为所述第二路径,所述欺骗路径以所述起始节点为起始点。Combining the candidate sub-paths into a spoofed path as the second path, the spoofed path takes the starting node as a starting point. 6.一种路径生成装置,其特征在于,包括:6. A path generation device, characterized in that, comprising: 获取模块,用于获取待处理图像;The acquisition module is used to acquire the image to be processed; 缩放模块,用于对所述待处理图像进行缩放,得到缩放图像;a scaling module for scaling the to-be-processed image to obtain a scaled image; 第一规划模块,用于在所述缩放图像上进行路径规划,得到第一路径;a first planning module, configured to perform path planning on the zoomed image to obtain a first path; 第一生成模块,用于生成所述待处理图像的子目标图,作为第一子目标图;其中,子目标图为:在所述待处理图像中,以所述待处理图像中的凸角落为子目标,并将满足预设条件的子目标相连接形成的图;a first generating module, configured to generate a sub-target map of the to-be-processed image as a first sub-target map; wherein, the sub-target map is: in the to-be-processed image, a convex corner in the to-be-processed image is used is a sub-goal, and a graph formed by connecting sub-goals that meet the preset conditions; 映射模块,用于将所述第一路径中的节点映射至所述第一子目标图,得到所述第一子目标图中的第一路径点;a mapping module, configured to map the nodes in the first path to the first sub-goal graph to obtain a first path point in the first sub-goal graph; 确定模块,用于在所述第一子目标图中,确定与所述第一路径点之间满足预设条件的节点;a determining module, configured to determine, in the first sub-goal graph, a node that satisfies a preset condition with the first path point; 第二生成模块,用于基于所确定的节点和所述第一路径点,生成所述第一子目标图的子目标图,作为第二子目标图;a second generating module, configured to generate a sub-goal graph of the first sub-goal graph based on the determined node and the first path point, as a second sub-goal graph; 第二规划模块,用于在所述第二子目标图上进行路径规划,得到目标路径。The second planning module is configured to perform path planning on the second sub-goal graph to obtain a target path. 7.根据权利要求6所述的装置,其特征在于,所述第一规划模块,具体用于:7. The device according to claim 6, wherein the first planning module is specifically used for: 在所述缩放图像上,确定起始节点、真实目标节点、预设虚假目标节点和多个中间节点;On the zoomed image, determine a starting node, a real target node, a preset false target node and a plurality of intermediate nodes; 基于最短路径规划模型和识别方行为模型,获取给定观测情形下的候选节点集合在每个中间节点位置处的后验概率分布,所述候选节点集合包括所述真实目标节点和预设虚假目标节点;Based on the shortest path planning model and the behavior model of the recognizer, obtain the posterior probability distribution of the candidate node set at the position of each intermediate node under a given observation situation, where the candidate node set includes the real target node and the preset false target node; 基于所述后验概率分布,评估中间节点的欺骗量级;assessing the magnitude of deception of the intermediate node based on the posterior probability distribution; 根据中间节点的欺骗量级,求解预设目标函数下的候选子路径;According to the deception magnitude of the intermediate node, solve the candidate sub-path under the preset objective function; 将所述候选子路径组合成欺骗路径,作为所述第一路径,所述欺骗路径以所述起始节点为起始点。Combining the candidate sub-paths into a spoofed path as the first path, the spoofed path takes the starting node as a starting point. 8.根据权利要求6所述的装置,其特征在于,所述预设条件为:两个节点构成的平行四边形内,不存在障碍物及其他子目标。8 . The device according to claim 6 , wherein the preset condition is: there are no obstacles and other sub-targets in a parallelogram formed by two nodes. 9 . 9.根据权利要求6所述的装置,其特征在于,所述第二规划模块,包括:9. The apparatus according to claim 6, wherein the second planning module comprises: 第一规划子模块,用于在所述第二子目标图上进行路径规划,得到第二路径;a first planning submodule, configured to perform path planning on the second sub-goal graph to obtain a second path; 映射子模块,用于将所述第二路径中的节点映射至所述待处理图像中,得到所述待处理图像中的第二路径点;a mapping submodule, configured to map the nodes in the second path to the image to be processed to obtain the second path point in the image to be processed; 第二规划子模块,用于在所述待处理图像上,基于所述第二路径点进行欺骗路径规划,得到所述目标路径。The second planning submodule is configured to perform deception path planning on the image to be processed based on the second path point to obtain the target path. 10.根据权利要求9所述的装置,其特征在于,所述第一规划子模块,具体用于:10. The apparatus according to claim 9, wherein the first planning sub-module is specifically used for: 在所述第二子目标图上,确定起始节点、真实目标节点、预设虚假目标节点和多个中间节点;On the second sub-target graph, determine a starting node, a real target node, a preset false target node and a plurality of intermediate nodes; 基于最短路径规划模型和识别方行为模型,获取给定观测情形下的候选节点集合在每个中间节点位置处的后验概率分布,所述候选节点集合包括所述真实目标节点和预设虚假目标节点;Based on the shortest path planning model and the behavior model of the recognizer, obtain the posterior probability distribution of the candidate node set at the position of each intermediate node under a given observation situation, where the candidate node set includes the real target node and the preset false target node; 基于所述后验概率分布,评估中间节点的欺骗量级;assessing the magnitude of deception of the intermediate node based on the posterior probability distribution; 根据中间节点的欺骗量级,求解预设目标函数下的候选子路径;According to the deception magnitude of the intermediate node, solve the candidate sub-path under the preset objective function; 将所述候选子路径组合成欺骗路径,作为所述第二路径,所述欺骗路径以所述起始节点为起始点。Combining the candidate sub-paths into a spoofed path as the second path, the spoofed path takes the starting node as a starting point.
CN201911130105.8A 2019-11-18 2019-11-18 Path generation method and device Active CN110823228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911130105.8A CN110823228B (en) 2019-11-18 2019-11-18 Path generation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911130105.8A CN110823228B (en) 2019-11-18 2019-11-18 Path generation method and device

Publications (2)

Publication Number Publication Date
CN110823228A CN110823228A (en) 2020-02-21
CN110823228B true CN110823228B (en) 2021-04-02

Family

ID=69556582

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911130105.8A Active CN110823228B (en) 2019-11-18 2019-11-18 Path generation method and device

Country Status (1)

Country Link
CN (1) CN110823228B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111462323B (en) * 2020-05-06 2023-04-18 中国人民解放军国防科技大学 Three-dimensional space-oriented dynamic deception path planning method and system
CN111982138B (en) * 2020-07-09 2022-06-28 北京百度网讯科技有限公司 Prediction model obtaining and path planning method, device and storage medium
CN111813131B (en) * 2020-09-01 2020-11-24 中国人民解放军国防科技大学 A guidance point marking method, device and computer equipment for visual navigation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005094462A2 (en) * 2004-03-23 2005-10-13 Google Inc. Generating, storing, and displaying graphics using sub-pixel bitmaps
CN106294458A (en) * 2015-05-29 2017-01-04 北京四维图新科技股份有限公司 A kind of map point of interest update method and device
CN106803402A (en) * 2017-04-05 2017-06-06 山东慧行天下文化传媒有限公司 Intelligent guide guide system and method based on the classification display of map pantograph ratio
CN107422726A (en) * 2017-04-26 2017-12-01 江苏大学 A kind of independent navigation intelligent variable spraying system and its control method applied to greenhouse

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005094462A2 (en) * 2004-03-23 2005-10-13 Google Inc. Generating, storing, and displaying graphics using sub-pixel bitmaps
CN106294458A (en) * 2015-05-29 2017-01-04 北京四维图新科技股份有限公司 A kind of map point of interest update method and device
CN106803402A (en) * 2017-04-05 2017-06-06 山东慧行天下文化传媒有限公司 Intelligent guide guide system and method based on the classification display of map pantograph ratio
CN107422726A (en) * 2017-04-26 2017-12-01 江苏大学 A kind of independent navigation intelligent variable spraying system and its control method applied to greenhouse

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
A quantitative measure for the navigability of a mobile robot using rough maps;Jooseop Yun;《2008 IEEE/RSJ International Conference on Intelligent Robots and Systems》;20081014;第3458-3464页 *
Combining Subgoal Graphs with Reinforcement Learning to Build a Rational Pathfinder;Junjie Zeng 等;《Applied sciences》;20190117;第1-21页 *
Subgoal Graphs for Optimal Pathfinding in Eight-Neighbor Grids;Tansel Uras 等;《Preceedings the Twenty-Third International Conference on Automated Planning and Scheduling》;20130131;第224-232页 *
多移动机器人编队控制与协作运输研究;杨帆;《中国博士学位论文全文数据库》;20110828;第1-179页 *
室内移动机器人走廊识别及拓扑图构建研究;林展鹏;《中国优秀硕士学位论文全文数据库》;20160501;第1-72页 *

Also Published As

Publication number Publication date
CN110823228A (en) 2020-02-21

Similar Documents

Publication Publication Date Title
CN110823228B (en) Path generation method and device
WO2020098250A1 (en) Character recognition method, server, and computer readable storage medium
CN113240505B (en) Method, apparatus, device, storage medium and program product for processing graph data
CN102067175A (en) Automatic face detection and identity masking in images, and applications thereof
CN110852521B (en) Method and device for generating deception path
CN108986197A (en) 3D skeleton line construction method and device
CN109558901A (en) A kind of semantic segmentation training method and device, electronic equipment, storage medium
JP7395705B2 (en) Estimation device, estimation method and program
CN110197149A (en) Ear&#39;s critical point detection method, apparatus, storage medium and electronic equipment
US20180205550A1 (en) System to enforce privacy in images on an ad-hoc basis
CN110969243A (en) Method and device for training countermeasure generation network for preventing privacy leakage
CN105224582B (en) Information processing method and equipment
Kang et al. Zk-img: Attested images via zero-knowledge proofs to fight disinformation
CN110889315B (en) Image processing method, device, electronic equipment and system
CN115937596A (en) Target detection method, training method and device of model thereof, and storage medium
CN117671652A (en) Distraction driving behavior joint identification method and system based on-chain federal learning
CN111353554B (en) Method and device for predicting missing user service attributes
CN116702941A (en) Method and device for selecting mechanism website, electronic equipment and storage medium
CN113838076A (en) Method and device for labeling object contour in target image, and storage medium
CN113128278A (en) Image identification method and device
Batskos et al. Preventing face morphing attacks by using legacy face images
CN109359689A (en) A kind of data identification method and device
Cvejic et al. Improving fusion of surveillance images in sensor networks using independent component analysis
CN104915941B (en) The method and apparatus for calculating parallax
Hancock et al. Accurate Traffic State Prediction with Deep Learning-Analyzing Statistical Aides for Identifying Anomalous Traffic Trends

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant