Visual Measurement Integrity Monitoring for UAV Localization

09/18/2019
by   Chengyao Li, et al.
0

Unmanned aerial vehicles (UAVs) have increasingly been adopted for safety, security, and rescue missions, for which they need precise and reliable pose estimates relative to their environment. To ensure mission safety when relying on visual perception, it is essential to have an approach to assess the integrity of the visual localization solution. However, to the best of our knowledge, such an approach does not exist for optimization-based visual localization. Receiver autonomous integrity monitoring (RAIM) has been widely used in global navigation satellite systems (GNSS) applications such as automated aircraft landing. In this paper, we propose a novel approach inspired by RAIM to monitor the integrity of optimization-based visual localization and calculate the protection level of a state estimate, i.e. the largest possible translational error in each direction. We also propose a metric that quantitatively evaluates the performance of the error bounds. Finally, we validate the protection level using the EuRoC dataset and demonstrate that the proposed protection level provides a significantly more reliable bound than the commonly used 3σ method.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/28/2022

Safety-quantifiable Line Feature-based Monocular Visual Localization with 3D Prior Map

Accurate and safety-quantifiable localization is of great significance f...
research
12/07/2022

LSVL: Large-scale season-invariant visual localization for UAVs

Localization of autonomous unmanned aerial vehicles (UAVs) relies heavil...
research
03/04/2020

Relative Visual Localization for Unmanned Aerial Systems

Cooperative Unmanned Aerial Systems (UASs) in GPS-denied environments de...
research
11/14/2022

Bayesian Integrity Monitoring for Cellular Positioning – A Simplified Case Study

Bayesian receiver autonomous integrity monitoring (RAIM) algorithms are ...
research
07/01/2018

Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

Full Disk Encryption (FDE) has become a widely used security feature. Al...
research
02/15/2020

Security of HyperLogLog (HLL) Cardinality Estimation: Vulnerabilities and Protection

Count distinct or cardinality estimates are widely used in network monit...
research
05/23/2019

A Convolutional Cost-Sensitive Crack Localization Algorithm for Automated and Reliable RC Bridge Inspection

Bridges are an essential part of the transportation infrastructure and n...

Please sign up or login with your details

Forgot password? Click here to reset