Systems and methods for the localization of objects buried in the seabed
11947006 ยท 2024-04-02
Inventors
- Wendy E Snyder (Bremerton, WA, US)
- Forrest N French (Poulsbo, WA, US)
- Stephen John Leahu (Poulsbo, WA, US)
Cpc classification
International classification
B63G8/00
PERFORMING OPERATIONS; TRANSPORTING
Abstract
Systems and methods are provided to detect and identify targeted objects buried in the seabed. A targeted area of the seabed may be scanned with a sub-bottom profiler based on predetermined parameters. A localization engine may model the sub-bottom profiler data using a Levenberg-Marquardt non-linear least squares determination. Distance measurements may be extracted based on the modeled data, including a vertical range based on a slant range measured from the sub-bottom profiler to the closest points on the exterior of the targeted objects. The location of the targeted objects may be based on the extracted measurements. In some embodiments, the sub-bottom profiler may be mounted on an unmanned underwater vehicle having thrusters to navigate the vehicle toward the targeted area to excavate and sidescan the targets object.
Claims
1. A method for localization of objects buried in a seabed, comprising the steps of: scanning, via a sub-bottom profiler, a targeted area of the seabed for a targeted object; receiving sub-bottom profiler data from the sub-bottom profiler; generating, via a localization engine, a derivative matrix based on the received sub-bottom profiler data; and, determining a location of the targeted object using a Levenberg-Marquardt non-linear least squares method based on the derivative matrix.
2. The method of claim 1, wherein the derivative matrix comprises a set of squared values representing distance measurements derived from the sub-bottom profiler data.
3. The method of claim 2, wherein the distance measurements comprise a vertical range based on a slant range, the slant range measured from the sub-bottom profiler to the targeted object.
4. The method of claim 1, further comprising the steps of: adjusting the derivative matrix based on the location determination from Levenberg-Marquardt non-linear least squares method; and, updating the location determination of the targeted object based on the adjusted derivative matrix.
5. The method of claim 1, wherein the location determination is based on a dampening factor applied to the derivative matrix.
6. The method of claim 1, wherein the sub-bottom profiler is mounted on an underwater vehicle, wherein the underwater vehicle comprises a plurality of thrusters, the thrusters adapted to control the navigation and stability of the underwater vehicle.
7. The method of claim 6, further comprising the steps of: navigating to the targeted area; and, receiving updated sub-bottom profiler data from the sub-bottom profiler while the underwater vehicle navigates toward the targeted area.
8. The method of claim 7, further comprising the step of: excavating the targeted area to expose at least a portion of the targeted object, wherein the excavating step is performed by tools mounted on the underwater vehicle; scanning, via sidescan sonar, the exposed portion of the targeted object; and, identifying targeted object based on the sidescan data received from the sidescan sonar.
9. The method of claim 1, wherein the derivative matrix is generated by the localization engine using a model, wherein the model comprises a representation of the received sub-bottom profiler data.
10. The method of claim 9, wherein the model comprises:
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The foregoing and other objects, features, and advantages for embodiments of the present disclosure will be apparent from the following more particular description of the embodiments as illustrated in the accompanying drawings, in which reference characters refer to the same parts throughout the various views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating principles of the present disclosure.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
DETAILED DESCRIPTION OF THE DISCLOSURE
(12) Reference will now be made in detail to the embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings.
(13) The present disclosure may be embodied in various forms, including a system, a method, or a computer readable medium for scanning, within the sea 1 under the water surface 2, the seabed 4 to detect and identify targeted objects 5 buried beneath the seafloor 3. As shown in
(14) Referring back to
(15)
(16) As shown in
(17) An embodiment of the disclosed system that may be implemented in many different ways, using various components and modules, including any combination of circuitry described herein, such as hardware, software, middleware, application program interfaces (APIs), and/or other components for implementing the corresponding features of the circuitry. The system may include a localization engine 15, as further described below. In an embodiment, as shown in
(18)
(19) The localization method 26 utilizes the beam-width effects of the sub-bottom profiler 7. Because of the aperture of the sub-bottom profiler 7, targeted objects 5 resulting in strong enough reflections located anywhere within the beam of the sonar for a given ping will result in a return in the sub-bottom data. Because returns ranges are based on acoustic travel time, returns from objects 7 off the main axis of the sub-bottom aperture will have longer travel times and thus appear deeper than their corresponding profiler data. When the sound speed is constant, the vertical range measurement (R.sub.m) 10 extracted from the sub-bottom data is equal to the actual slant range (R.sub.s) 9 between the sub-bottom transducer 7 and the targeted object 5 creating the reflection. Based on these relationships, when the reflection comes from the closest point on the target 5 and there is no tidal change over the duration of data collection, a non-linear least squares model may be utilized to locate a targeted object 5 based on collected sub-bottom data.
(20) In some embodiments, the targeted object 5 is predetermined to have a linear shape. For linear targeted objects 5, the targeted object 5 may be parameterized by six features: x, y, z, bearing, plunge and length. The x, y, z coordinates provide the location of one endpoint of the targeted object 5, in a local tangent plane Cartesian coordinate system. The bearing may be the angle the line of the targeted object 5 from due north, in a counterclockwise positive direction. The plunge may be the angle the line of the targeted object 5 with the horizontal sea surface 2. The length corresponds to the overall length of the targeted object 5. Points on the target are defined by parametric equations:
xp=x+t*sin(?)*cos(?)
yp=y+t*cos(?)*cos(?)
zp=z+t*sin(?)
where t is the length along the target (0<t<length).
(21) The system model may be defined as a function of the parameters for the targeted object 5, excluding length which may be predetermined or later determined using sidescan sonar after excavation of at least a portion of the targeted object 5. The system model may represent the vertical range measurement (R.sub.m) 10 squared may be based on the actual slant range (R.sub.s) 9 squared between the sub-bottom profiler 7 and target object 5. While the squared distances are used in some embodiments using derivatives in the least squares solution, actual distances may also be used in accordance with the present disclosure. The depth measurement (dep) 8 together with its corresponding vertical range measurement (R.sub.m) 10 may be set to equal a vertical measurement (Z.sub.meas) for the targeted object 5. The system model may comprise:
(22)
where x.sub.v, y.sub.v and dep is location and depth of the sub-bottom profiler 7 corresponding to the vertical measurement of Z.sub.meas 11. The subscript i indicates the index of each data point in which a strong reflection was measured. The values t.sub.i are selected such that R.sub.s is minimized over 0<t<target length using the equation:
t.sub.i=((x.sub.v,i?x)*sin ? cos ?+(y.sub.v,i?y)*cos ? cos ?+(dep.sub.i?z)*sin(?))/(sin.sup.2? cos.sup.2?+cos.sup.2? cos.sup.2?+sin.sup.2?)
The predetermined location of the targeted object 5 is then determined by minimizing:
?.sub.i?F.sub.i(x,y,z,?,?)?.sup.2
over a set of sub-bottom contact data.
(23) The minimization may be facilitated by incorporating the non-linear least squares Levenberg-Marquardt optimization method into the disclosed method 26. In an embodiment, the steps of a localization method 26 may include: 1) Define initial predetermined parameters X.sub.0=[x.sub.0, y.sub.0, z.sub.0,?.sub.0,?.sub.0] and damping factor ? 2) Iterate the following until X converges: a. For each i, find t.sub.i that minimizes:
sqrt[(x.sub.k+t.sub.i*sin(?.sub.k)*cos(?.sub.k)?x.sub.v,i).sup.2+(y.sub.k+t.sub.i*cos(?.sub.k)*cos(?.sub.k)?y.sub.v,i).sup.2+(z.sub.k+t.sub.i*sin(?.sub.k)+dep.sub.i).sup.2] b. Compute F.sub.i (X.sub.k) for each i c. Compute derivative matrix dF.sub.k for F.sub.i(X.sub.k) d. Compute new predetermined values for X.sub.k+1 and J.sub.k+1
X.sub.k+1=X.sub.k?(dF.sub.k.sup.T*dF.sub.k+?I.sub.5).sup.?1*dF.sub.k.sup.T*F(X.sub.k) e. If J.sub.k+1<J.sub.k: Accept update to X.sub.k+1 set ?=0.8*?(or otherwise reduce lambda) Else: Reject update set ?=2*?(or otherwise increase lambda) f. Compute change in predetermined values
dX.sub.k=X.sub.k+1?X.sub.k g. Test for convergence (max(|dX.sub.k|)<0.001) h. If not converged, repeat iteration unless the desired maximum number of iterations has been completed 3) Once converged compute quality of fit for final X.sub.k:
J.sub.min=?.sub.i|F.sub.i(x.sub.k,y.sub.k,z.sub.k,?.sub.k,?.sub.5)|.sup.2 4) Normalize quality by number of data points to aid in comparison of different inputs
J.sub.norm=J.sub.min/n
where n is the number of sub-bottom data points.
(24) When length of the targeted object 5 is unknown, the solution can be determined for varying parameters for length of the targeted object 5. The length that yields the lowest value of J.sub.norm or at which J.sub.norm converges to a minimum value is the most likely value of length.
(25) A script may be written to process sub-bottom data using the aforementioned method 26, taking as input a set of sub-bottom contacts 5 including the location and measured depth of each contact 5. The output gives the optimal fit values of the target parameters based on the contacts 5 and shows an x/y plot of each location for a contact 5 contact with the targeted area as well as a comparison of each actual measured contact verses the expected return for the resulting contact 5.
(26)
(27) The seabed may be surveyed by the sub-bottom profiler, and profiler data is collected. Using sub-bottom data points for a predetermined targeted areas based on X, the distance from a profiler/transducer may be determined. This step identifies the shortest distance between the scanned area and the predetermined targeted area. Scanned sub-bottom profiler data, a predetermined shape of a buried object, and a predetermined location of a buried object represented by X are processed by the steps 27 of the method 26 implemented by a localization engine 15. The steps 27 may determine the difference between sub-bottom profiler data measurements, the depth from a SONAR-baring vehicle with sub-bottom profiler data, a slant range distance formula of a vehicle to X, and the nearest point from the previous step for each data point after a prior run of the steps 27. These values are squared and summed. The steps 27 also sum the squares of errors, or the values of J denoted as J.sub.k, where k equals the iteration of the steps 27. If K equals 5, then the steps 27 have run five times and J.sub.k is utilized in further steps 27.
(28) In some embodiments, a derivative matrix is determined based on the current X value, or X.sub.k. The steps 27 are based on J.sub.k when a derivative matrix for a current X.sub.k is utilized. A new value of X.sub.k is determined. Values of J.sub.k may determine whether a new current X.sub.k value has a greater or lesser chance of being correct. The steps 27 may apply the Levenberg-Marquardt non-linear least squares formula based on the new parameters resulting from determining a derivative matrix of a current X.sub.k, value denoted as X.sub.k+1.
(29) The steps 27 may determine the sum of the squares of error values of J based a new X.sub.k+1. The sum of squares of error values of J using a new X.sub.k+1 is determined, and new error values of J denoted as J.sub.k+1 are determined. New J.sub.k+1, also referred to as new summed squares of errors, may be compared to an immediate previous error values of J to determine the degree of error. If J.sub.k+1 is larger than J.sub.k, the next iterations of the steps 27 may increase ?, a dampening factor, to a smaller adjustment and continue to use X.sub.k. If J.sub.k+1 is smaller than J.sub.k, the next iterations of the steps 27 may update X.sub.k to X.sub.k+1 and reduces X. A smaller J.sub.k+1 may be desired, as a smaller J.sub.k+1 indicates scanning the seabed in a correct direction.
(30) The change in the X value is determined by the steps 27. A new value of X may be subtracted from an immediate previous value of X, or X.sub.k+1-X.sub.k. The steps 27 may examine the change in X against a convergence value. A convergence value may be predetermined. If the change in X is more than the convergence value, or if k is less than the number of maximum iterations, X.sub.k+1 is returned to the beginning of the iteration and becomes X.sub.k in the formulae. If X is less than the convergence number, or k is greater than the number of maximum iterations, steps stops and produces an output parameter value. Output parameter values are a best-fit values for the location of a buried object.
(31)
(32)
(33)
(34) In order to locate a buried fiber optic cable 5, in an embodiment, a targeted area is determined based on the location where at least a portion of the buried cable 5 was known to exist, a current X value, along with Y and Z coordinates for scanning and determining the shape of the a buried fiber optic cable 5. During a sonar scan, an X-value will change, as lateral (Y) and depth (Z) coordinates are remain constant. The model also determines whether a dampening factor ? will be increased or decreased for errors. A predetermined number of iterations of the steps 27 is set, as well as a convergence number to end the iterations of the steps 27. The UUV 6 may utilize sonar to scans a predetermined targeted area of the seabed. For example, the buried fiber optic cable 5 may be found in a targeted area of one-meter wide, ten-meters long, and five-meters deep. One-meter and five-meters are coordinates Y and Z, respectively for this example. As a UUV travels, a SONAR scans and generates pings that bounce off of sediments and the object 5, returning to a SONAR receiver 7. Each ping return is a set of data points. High pitched ping returns typically non-organic material, such as a buried fiber optic cable 5. Low pitched ping returns generally organic material, such as sea sediments. The returned pings are also referred to as sub-bottom data. The distance between a UUV 6 and the targeted object 5 may be recorded, along with the depth of the UUV 6, and the slant range distance (R.sub.s) 9 from the UUV 6 to a location of a buried fiber optic cable 5.
(35) The steps 27 may determine the shortest distance between a targeted area for a buried fiber optic cable 5 and the scans from the sub-bottom profiler 7, as data is collected. A predetermined shape of a buried fiber optic cable 5 may be used by the steps 27, along with a targeted area for a buried fiber optic cable 5.
(36) Steps 27 may compute the differences between sub-bottom data measurements, such as R.sub.m 10, the depth of the UUV 6, the slant range distance R.sub.s 9 from the UUV 6 to a targeted area for a buried fiber optic cable 5, and the differences between the current targeted area and a previous targeted area. If this is the first run of the steps 27, the distance between the current and previous targeted area is the current targeted area of a buried fiber optic cable 5.
(37) The steps 27 may square and sum all of the differences, and the errors, of where a fiber optic cable 5 may not be. The steps 27 may use a squared differences and a targeted area of a buried fiber optic cable 5 to calculate a derivative matrix. The product of a derivative matrix is a new value of X, or a new targeted area for the buried fiber optics cable 5. A new targeted area may be used by the Levenberg-Marquardt non-linear least squares formula. A new summed square of errors may be determined for a new targeted area. If a new squared error is less than the immediate previous error, a new targeted area of a buried fiber optic cable 5 is used by the steps 27 as the next targeted area at the beginning of the subsequent iteration of the steps 27. The steps 27 update for the new targeted area of a buried fiber optic cable 5, and reduce the dampening factor ? by the predetermined amount at the start of buried object localization process 26.
(38) The steps 27 may determine the difference between a new targeted area and the preceding targeted area. If the difference is less than a predetermined convergence value, the steps 27 sue the new targeted area of the buried fiber optic cable 5 as a targeted contact 5 of a buried fiber optic cable 5. A contact 5 represents the determined location of a portion of a buried object 5. The localization method may include additional steps to excavate the targeted area and perform sidescans, as described above.
(39) The steps 27 may run as many times as there are scans, creating many contacts 5. The contacts 5 may be plotted on a two-dimensional graph, as shown in
(40) In some embodiments, the computer device 17 may include communication interfaces, system circuitry, input/output (I/O) interface circuitry, and display circuitry. The communication interfaces may include wireless transmitters and receivers (herein, transceivers) and any antennas used by the transmit-and-receive circuitry of the transceivers. The transceivers and antennas may support Wi-Fi network communications, for instance, under any version of IEEE 802.11, e. g., 802.11n or 802.11ac, or other wireless protocols such as Bluetooth, Wi-Fi, WLAN, cellular (4G, LTE/A). The communication interfaces may also include serial interfaces, such as universal serial bus (USB), serial ATA, IEEE 1394, lighting port, I.sup.2C, slimBus, or other serial interfaces. The communication interfaces may also include wireline transceivers to support wired communication protocols. The wireline transceivers may provide physical layer interfaces for any of a wide range of communication protocols, such as any type of Ethernet, Gigabit Ethernet, optical networking protocols, data over cable service interface specification (DOCSIS), digital subscriber line (DSL), Synchronous Optical Network (SONET), or other protocol.
(41) The system circuitry may include any combination of hardware, software, firmware, APIs, and/or other circuitry. The system circuitry may be implemented, for example, with one or more systems on a chip (SoC), servers, application specific integrated circuits (ASIC), field programmable gate arrays (FPGA), microprocessors, discrete analog and digital circuits, and other circuitry. The system circuitry may implement any desired functionality of the system 16. As just one example, the system circuitry may include one or more instruction processor 19 and memory 18. The processor 19 may be one or more devices operable to execute logic. The logic may include computer executable instructions or computer code embodied in the memory 18 or in other memory that when executed by the processor 19, cause the processor 19 to perform the features implemented by the logic. The computer code may include instructions executable with the processor 19. Logic, such as programs or circuitry, may be combined or split among multiple programs, distributed across several memories and processors, and may be implemented in a library, such as a shared library (e.g., a dynamic link library or DLL).
(42) The memory 18 stores, for example, control instructions for executing the features of the disclosed system 16. Examples of the memory 18 may include non-volatile and/or volatile memory, such as a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), or flash memory. Alternatively or in addition, the memory 18 may include an optical, magnetic (hard-drive) or any other form of data storage device. In one implementation, the processor 19 executes the control instructions to carry out any desired functionality for the disclosed system 16, including without limitation those attributed to data/reflection receiver (e.g., relating to the data receiver circuitry), image generation, and/or profiler results generation. The control parameters may provide and specify configuration and operating options for the control instructions, and other functionality of the computer device 16.
(43) The computer device 17 may further include various data sources, as described herein. Each of the databases that are included in the data sources may be accessed by the system 16 to obtain data for consideration during any one or more of the processes described herein. For example, the data receiver circuitry may access the data sources to obtain the information for generating the images and the reflection returns. In an embodiment, a data receiver circuitry may be configured to receive reflected signals.
(44) All of the discussion, regardless of the particular implementation described, is exemplary in nature, rather than limiting. For example, although selected aspects, features, or components of the implementations are depicted as being stored in memories, all or part of the system or systems may be stored on, distributed across, or read from other computer readable storage media, for example, secondary storage devices such as hard disks, flash memory drives, floppy disks, and CD-ROMs. Moreover, the various modules and screen display functionality is but one example of such functionality and any other configurations encompassing similar functionality are possible.
(45) The respective logic, software or instructions for implementing the processes, methods and/or techniques discussed above may be provided on computer readable storage media. The functions, acts or tasks illustrated in the figures or described herein may be executed in response to one or more sets of logic or instructions stored in or on computer readable media. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firmware, micro code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like. In one embodiment, the instructions are stored on a removable media device for reading by local or remote systems. In other embodiments, the logic or instructions are stored in a remote location for transfer through a computer network or over telephone lines. In yet other embodiments, the logic or instructions are stored within a given computer, central processing unit (CPU), graphics processing unit (GPU), or system.
(46) While the present disclosure has been particularly shown and described with reference to an embodiment thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure. Although some of the drawings illustrate a number of operations in a particular order, operations that are not order-dependent may be reordered and other operations may be combined or broken out. While some reordering or other groupings are specifically mentioned, others will be apparent to those of ordinary skill in the art and so do not present an exhaustive list of alternatives.