Image- and Point Cloud-Based Detection of Damage in Robotic And

Total Page:16

File Type:pdf, Size:1020Kb

Image- and Point Cloud-Based Detection of Damage in Robotic And IMAGE- AND POINT CLOUD-BASED DETECTION OF DAMAGE IN ROBOTIC AND VIRTUAL ENVIRONMENTS By CALVIN DOBRIN A thesis submitted to the School of Graduate Studies Rutgers, The State University of New Jersey In partial fulfillment of the requirements For the degree of Master of Science Graduate Program in Mechanical and Aerospace Engineering Written under the direction of Aaron Mazzeo And approved by _________________________________ _________________________________ _________________________________ _________________________________ New Brunswick, New Jersey May, 2021 ABSTRACT OF THE THESIS IMAGE- AND POINT CLOUD-BASED DETECTION OF DAMAGE IN ROBOTIC AND VIRTUAL ENVIRONMENTS By CALVIN DOBRIN Thesis Director: Aaron D. Mazzeo Repair procedures are vital to maintain the integrity of long-term structures such as bridges, roads, and space habitats. To reduce the burden of manual inspection and repair of long- term environments, the proposed solution is an autonomous repair system used for damage detection and damage repair with very little human intervention. The primary purpose of this thesis is to lay the groundwork for the introductory steps related to detection of damage and creation of a virtual map for navigation in this system. It covers the process of initial detection of damage on a structure, confirmation of damage with detailed red-green-blue-depth (RGB-D) scanning, and development of a virtual map of the structure for navigation and localization of important features. We begin by reviewing numerous damage detection methods and establishing a case for optical 2D stereo imaging and 3D scanning. We performed image-processing and point cloud-processing methods to isolate damage in image and point cloud data. The potential of automating operation and data processing without human intervention is also discussed. To lay the groundwork of an autonomous system, a robot was set up to navigate in a virtual ROS environment and relay sensory information of its surroundings. This process establishes a framework for navigation and detecting damage in a system. ii ACKNOWLEDGEMENTS I would like to express my gratitude to my advisor, Professor Mazzeo, for his constant feedback, patience, and encouragement over the course of this project. His feedback during our meetings gave me new angles to approach the project with that I never would have considered. I would like to thank Dr. Patrick Hull for overseeing my progress and guiding the goals of the project during my internship at NASA’s Marshall Space Flight Center. Whenever I hit a roadblock, he would actively help me brainstorm the best way to overcome the problem and get me in touch with colleagues who could help. I would also like to acknowledge Noah Harmatz and Declan O’Brien from the Mazzeo Research group for their support on this project. Noah actively worked with me to integrate my research into damage detection with his work on patching and path planning and Declan graciously shared some of his datasets from working with his test articles. It was a pleasure brainstorming with them both on the larger scope of our project. Finally, I would like to thank my grandparents for their emotional support and encouragement. There were many occasions where I needed to step away and clear my head and they were always there for me. iii TABLE OF CONTENTS ABSTRACT OF THE THESIS ....................................................................................................... ii ACKNOWLEDGEMENTS ............................................................................................................ iii LIST OF FIGURES ........................................................................................................................ vi Chapter 1. Introduction .................................................................................................................... 1 1.1 Methods for Imaging, Mapping, and Detecting Damage ....................................................... 1 1.2 In-Space Manufacturing and Repair ...................................................................................... 4 1.3 Potential Obstacles to Characterizing Structural Integrity Autonomously ............................ 4 1.4 Overview of Envisioned System ............................................................................................ 5 1.5 Overview of Work Described in Thesis ................................................................................. 7 Chapter 2. Camera- and Laser-Based Acquisition of Real-World Environments ........................... 8 2.1 Cameras with Depth Information Acquisition ....................................................................... 8 2.1.1 Depth Information with ZED .......................................................................................... 8 2.1.2 Depth Information with Azure Kinect DK ................................................................... 12 2.1.3 Depth Information with Intel RealSense L515 ............................................................. 13 2.2 Structured Light Scanning with Einscan Pro 2X Plus ......................................................... 15 2.3 Localization with ZED Position Tracking ........................................................................... 17 2.4 SLAM-based Mapping: RTAB-Map ................................................................................... 19 2.4.1 Mapping with ZED ....................................................................................................... 19 2.4.2 Mapping with Azure Kinect .......................................................................................... 21 Chapter 3. Characterization of Features for Repairing Damage in Civil Infrastructure and Space- Relevant Habitats ........................................................................................................................... 24 3.1 Image Feature Extraction with RGB Images ....................................................................... 24 3.1.1 Surface features ............................................................................................................. 24 iv 3.1.2 Edge Detection .............................................................................................................. 29 3.2 Point Cloud Analysis ........................................................................................................... 37 3.2.1 K-Nearest Neighbor Approach ..................................................................................... 37 3.2.2 Fitting To 3D Surfaces .................................................................................................. 45 Chapter 4. Simulation/Virtual Environment .................................................................................. 52 4.1 Mapping ............................................................................................................................... 52 4.2 Post-Processing of Image and Depth Images ....................................................................... 59 4.3 Localization in Map ............................................................................................................. 61 Chapter 5. Conclusions .................................................................................................................. 62 Bibliography .................................................................................................................................. 63 v LIST OF FIGURES Figure 1: The SRMS and OBSS system. Image from [13] .............................................................. 3 Figure 2: System model of a concept for an autonomous repair system. The system is divided into a scan and patching phase. The IMU, Laser/LiDAR, and depth camera move over the surface to be scanned. The scan phase obtains image and point cloud data using an RGB-D camera for damage detection in MATLAB. The mapping software uses the joint IMU data, laser scans, and image data from the IMU, laser/LiDAR, and camera, respectively. If damage is detected, the robot attempts to re-localize itself to where it found damage and proceeds to the patching stage. 6 Figure 3: A ZED stereo camera. Image from [19]. .......................................................................... 8 Figure 4: A foam board test article used for damage detection identification. Damage on the surface consists of dropped items and punctured holes. The top right corner of the foam board shows five markers, used for feature detection, around a single crater. .......................................... 9 Figure 5: A confidence map of the upright foam board taken with ZED Depth Viewer. The shaded areas in the confidence map correspond to uncertainty in the depth map. Confidence values were set to approximately 85% confidence. ....................................................................... 10 Figure 6: A colored point cloud of the foam board surface displayed in MATLAB. The background points were filtered out. ............................................................................................. 10 Figure 7: A point cloud of the foam board surface taken with the ZED Depth Viewer. The color- coding based on values in the z-axis, where blue points are the lowest and yellow points are the highest. ........................................................................................................................................... 11 Figure 8: An Azure Kinect DK camera. Image from [20]. ...........................................................
Recommended publications
  • Microsoft Azure Essentials Azure Machine Learning
    Azure Machine Learning Microsoft Azure Essentials Jeff Barnes Visit us today at microsoftpressstore.com • Hundreds of titles available – Books, eBooks, and online resources from industry experts • Free U.S. shipping • eBooks in multiple formats – Read on your computer, tablet, mobile device, or e-reader • Print & eBook Best Value Packs • eBook Deal of the Week – Save up to 60% on featured titles • Newsletter and special offers – Be the first to hear about new releases, specials, and more • Register your book – Get additional benefits Hear about it first. Get the latest news from Microsoft Press sent to your inbox. • New and upcoming books • Special offers • Free eBooks • How-to articles Sign up today at MicrosoftPressStore.com/Newsletters Wait, there’s more... Find more great content and resources in the Microsoft Press Guided Tours app. The Microsoft Press Guided Tours app provides insightful tours by Microsoft Press authors of new and evolving Microsoft technologies. • Share text, code, illustrations, videos, and links with peers and friends • Create and manage highlights and notes • View resources and download code samples • Tag resources as favorites or to read later • Watch explanatory videos • Copy complete code listings and scripts Download from Windows Store PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2015 Microsoft Corporation. All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9817-8 Microsoft Press books are available through booksellers and distributors worldwide.
    [Show full text]
  • Data Localization Requirements Across Different Jurisdictions 70
    The Localisation Gambit Unpacking Policy Measures for Sovereign Control of Data in India 19th March, 2019 By ​Arindrajit Basu, Elonnai Hickok, and Aditya Singh Chawla Edited by ​Pranav M Bidare, Vipul Kharbanda, and Amber Sinha Research Assistance ​Anjanaa Aravindan The Centre for Internet and Society, India Acknowledgements 2 Executive Summary 3 Introduction 9 Methodology 10 Defining and Conceptualizing Sovereign Control of Data 11 Mapping of Current Policy Measures for Localization of Data in India 13 The Draft Personal Data Protection Bill, 2018 13 Draft E-commerce Policy (s) 17 RBI Notification on ‘Storage of Payment System Data’ 19 Draft E-Pharmacy Regulations 20 FDI Policy 2017 20 National Telecom M2M Roadmap 21 Unified Access License for Telecom 21 Companies Act, 2013 and Rules 21 The IRDAI (Outsourcing of Activities by Indian Insurers) Regulations, 2017 22 Guidelines on Contractual Terms Related to Cloud Services 22 Reflecting on Objectives, Challenges and Implications of National Control of Data 24 Enabling Innovation and Economic Growth 24 Enhancing National Security and Law Enforcement Access 34 Law Enforcement Access 34 Protecting Against Foreign Surveillance 36 Threat to fibre-optic cables 37 Widening Tax Base 40 Data Sovereignty and India’s Trade Commitments 41 A Survey of Stakeholder Responses 48 Data Localisation Around the World 49 Conclusions and Recommended Approaches 61 Annexure I 70 Mapping Data Localization Requirements Across Different Jurisdictions 70 Annexure 2 75 A survey of stakeholder responses 75 1 Acknowledgements The authors would like to thank Pranav MB, Vipul Kharbanda, Amber Sinha, and Saumyaa Naidu for their invaluable edits and comments on the draft.
    [Show full text]
  • Supplies and Services Contracts, Dated July 2010
    1. Caption Page of Pages SOLICITATION, OFFER, AND AWARD DOC Offender Management System 1 93 2. Contract Number 3. Solicitation Number 4. Type of Solicitation 5. Date Issued 6. Type of Market Sealed Bid (IFB) Open Sealed Proposals (RFP) 11/07/17 Set Aside Doc350609 Sole Source Open Market with Set-Aside Emergency CBE Designated Category 7. Issued By 8. Address Offer to: Office of Contracting and Procurement Office of Contracting and Procurement 441 - 4th Street, N.W., Suite 700 South 441 - 4th Street, N.W., Suite 700 South Washington, D.C. 20001 Washington, D.C. 20001 NOTE: In sealed bid solicitations “offer” or “offeror” means “bid or “bidder” SOLICITATION 9. Sealed offers in original and __1__ copies for furnishing the supplies or services in the Schedule will via electronic format via the on-line solicitation software __2:00 p.m. local time December 7, 2017 _ (Hour) (Date) CAUTION: Late submission, Modifications and Withdrawals: See 27 DCMR chapters 15 & 16 as applicable. All offers are subject to all terms & conditions contained in solicitation. 10. For Information A. Name B. Telephone C. E-mail Address Contact (Area Code) (Number) (Ext) Nicole Smith-McDermott 202 724.4587 [email protected] 11. Table of Contents (X) Section Description Page (X) Section Description Page No. No. PART I – THE SCHEDULE PART II – CONTRACT CLAUSES X A Solicitation/Contract Form 1 X I Contract Clauses 66 X B Supplies or Services and Price/Cost 2 PART III – LIST OF DOCUMENTS, EXHIBITS AND OTHER ATTACHMENTS X C Specifications/Work Statement 5 X J List of Attachments 76 X D Packaging and Marking 46 PART IV – REPRESENTATIONS AND INSTRUCTIONS X E Inspection and Acceptance 46 Representations, certification and other 77 X F Deliveries or Performance 47 X K statements of offerors X G Contract Administration Data 51 X L Instructions, conditions & notices to Offerors 78 X H Special Contract Requirements 58 X M Evaluation factors for award 88 12.
    [Show full text]
  • YGH 50Th Anniversary Exhibit Booklet
    The world is a fascinating place. Over the last 50 years we have had the honor and good fortune to build rich relationships and partner with colleagues and clients in the Northwest and over 40 countries around the globe. Here’s to 50 years of captivating, challenging, award-winning and just plain fun projects. 64 70 80 BUILDING A UNIQUE PRACTICE GROWTH & CHANGE Campbell Yost Grube “As in nature, the aesthetic qualities in architecture are derived from the way things work.” CAMPBELL YOST GRUBE ARCHITECTS YOST GRUBE HALL ARCHITECTS 90 2000 EVOLUTION & POSSIBILITY “Projects in the developing world have taught us to focus on the essential...” “... to produce architecture of excellence in service to our clients and society.” YGH ARCHITECTURE “From the Northwest, across the U.S. and to the Sudan...It’s been quite an adventure.” -Joachim Grube Building a Unique Practice Consider this: 50 years ago there were no computers. A GPS system was a well-worn map that folded 60 nicely in your back pocket. The level of communication we take for granted today didn’t exist. That didn’t make it any less exciting to be a small, young architecture fi rm hungry to make a difference. The fi rm’s focus on creative “problem seeking” led to signifi cant projects for the State of Oregon and the Oregon Board of Higher Education, as well as a national building program and work overseas. 70 60 -70’s Portland State University Campus Master Plans YGH developed three major campus plans for Portland State University from 1970 to 1985.
    [Show full text]
  • FPL Florida Power & Light Company FPSC Florida Public Service Commission FPUC Florida Public Utilities Company FRCC Florida Reliability Coordinating Council F.S
    I. Meeting Packet State of Florida Public Service Commission INTERNAL AFFAIRS AGENDA Tuesday, November 29, 2016 Following Special Commission Agenda Room 105 - Gerald L. Gunter Building 1. “Update from the Federal Communications Commission” by The Honorable Mignon Clyburn, FCC Commissioner 2. Draft Review of the 2016 Telecommunications Regulatory Assessment Fee Report (Attachment 1) 3. Draft Review of the 2016 Annual Report on Activities Pursuant to the Florida Energy Efficiency and Conservation Act (Attachment 2) 4. Draft Review of the 2016 Lifeline Report to the Legislature (Attachment 3) 5. Draft Review of the 2016 Ten-Year Site Plans for Florida’s Electric Utilities (Attachment 4) 6. General Counsel’s Report 7. Executive Director’s Report 8. Other Matters BB/ks OUTSIDE PERSONS WISHING TO ADDRESS THE COMMISSION ON ANY OF THE AGENDAED ITEMS SHOULD CONTACT THE OFFICE OF THE EXECUTIVE DIRECTOR AT (850) 413-6463. Attachment 1 REPORT ON THE EFFORTS OF THE FLORIDA PUBLIC SERVICE COMMISSION TO REDUCE THE REGULATORY ASSESSMENT FEE FOR TELECOMMUNICATIONS COMPANIES As of December 2016 REPORT ON THE EFFORTS OF THE FLORIDA PUBLIC SERVICE COMMISSION TO REDUCE THE REGULATORY ASSESSMENT FEE FOR TELECOMMUNICATIONS COMPANIES As of December 2016 Office of Telecommunications Introduction During the 2011 Legislative Session, House Bill CS/CS/HB 1231, the “Regulatory Reform Act” (Act), was passed and signed into law by the Governor, effective July 1, 2011. Under the Act, the Legislature eliminated most of the Florida Public Service Commission’s (FPSC’s or Commission’s) retail oversight authority for the telecommunications wireline companies, yet maintained the FPSC’s authority over wholesale intercarrier issues.
    [Show full text]
  • Commerce JSI: from Enabling Issues to Data and Source Code Provisions
    ISSUE PAPER Addressing the Digital Divide in E- commerce JSI: from Enabling Issues to Data and Source Code Provisions By Leonila Guglya and Marilia Maciel [DRAFT, NOT TO BE CIRCULATED] Page 1 of 72 Table of contents Acknowledgements ....................................................................................................................................... 5 Abstract ......................................................................................................................................................... 6 Abbreviations ................................................................................................................................................ 7 1. Introduction ......................................................................................................................................... 11 1.1. Overview of the issue paper ............................................................................................................ 11 1.2. The value of data for e-commerce ................................................................................................... 12 1.3 Digital divide: from access-to-access (A2A) to access-to-knowledge (A2K) and data..................... 15 1.4. The digital divide in e-commerce discussions at the WTO .............................................................. 16 2. Enabling issues in the JSI on e-commerce ........................................................................................ 17 2.1. The presumption of e-commerce readiness ...................................................................................
    [Show full text]
  • March 10, 2020 FACT SHEET* Mandating STIR/SHAKEN And
    March 10, 2020 FACT SHEET* Mandating STIR/SHAKEN and Proposing Additional Measures to Combat Illegal Spoofing Report and Order and Further Notice of Proposed Rulemaking – WC Docket Nos. 17-97, 20-67 Background: Each day, Americans receive millions of unwanted phone calls, including calls that “spoof” or falsify caller ID information with a malicious intent. These spoofed calls are not simply an annoyance—they result in billions of dollars lost to fraud, degrade consumer confidence in the voice network, and harm public safety. This Report and Order and Further Notice of Proposed Rulemaking would take a critical step in the Commission’s multi-pronged approach to ending illegal caller ID spoofing by requiring voice service providers to implement caller ID authentication technology. Known as STIR/SHAKEN, this technology enables voice service providers to verify that the caller ID information transmitted with a particular call matches the caller’s number—and provides valuable information to detect illegally spoofed calls. Widespread implementation of STIR/SHAKEN will reduce the effectiveness of illegal spoofing, allow law enforcement to identify bad actors more easily, and help voice service providers identify calls with illegally spoofed caller ID information before those calls reach their subscribers. Most importantly, it will help restore Americans’ trust in the voice network, which has been eroded by the prevalence of illegal caller ID spoofing. What the Order Would Do: • Require originating and terminating voice service providers to implement the STIR/SHAKEN caller ID authentication framework in the Internet Protocol (IP) portions of their networks by June 30, 2021, a deadline that is consistent with the TRACED Act, which was recently passed by Congress.
    [Show full text]
  • Who Are Columbia's Highest-Paid Nonprofit Organization Administrators? Home-Grown Data Center Sets Record Pace
    Volume 13 Issue 33 November 3, 2007 $ 50 www.columbiabusinesstimes.com 1 R Flat Branch: Creek of dreams LE The Flat Branch area downtown has been the TT KE source of both inspiration and near-despera- R tion. It was the city’s first commercial area and its first light industrial area. It also was a blighted area subjected to urban renewal, JENNIFE BY and an area where grand development proj- otos H ects were shot down. In the first part of a P two-part series, Ray Beck looks at the history of Flat Branch. The transfor- mation of the Flat Branch area of downtown into a park is nearly com- plete, ameliorating the deterioration along the creek that had long been Beck a source of concern for the city. Historically, many cities have been organized along waterways. While it is certainly no Missouri River, Flat Branch Creek is where our city took root, and it was an important factor in locating the county seat in Columbia in 1821. While it may be a strange concept to today’s Columbians, who have known it Home-grown data as an ugly drainage ditch, the creek was a boon to the residents who abandoned the nearby town of Smithton, a half-mile center sets record pace to the west, to obtain potable water from Profile on Page 5. Carfax VP Gary Lee a well in the Flat Branch bottoms. The creek also served as a boundary for horse races on Broadway, which an early ordi- nance only allowed on Saturdays. (continued on Page 19) Who are Columbia’s highest-paid Proposition 1 Schuster, Wolverton weigh in on county sales tax issue.
    [Show full text]
  • Sensible Bytes: States Need a New Approach to Justify Their Recruitment of Internet Data Centers
    William & Mary Environmental Law and Policy Review Volume 2013-2014 Issue 3 Article 6 May 2014 Sensible Bytes: States Need a New Approach to Justify Their Recruitment of Internet Data Centers Michael F. Kaestner Follow this and additional works at: https://scholarship.law.wm.edu/wmelpr Part of the Business Organizations Law Commons, Energy Policy Commons, and the Environmental Law Commons Repository Citation Michael F. Kaestner, Sensible Bytes: States Need a New Approach to Justify Their Recruitment of Internet Data Centers, 38 Wm. & Mary Envtl. L. & Pol'y Rev. 733 (2014), https://scholarship.law.wm.edu/wmelpr/vol38/iss3/6 Copyright c 2014 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmelpr SENSIBLE BYTES: STATES NEED A NEW APPROACH TO JUSTIFY THEIR RECRUITMENT OF INTERNET DATA CENTERS MICHAEL F. KAESTNER* INTRODUCTION Fundamental changes in the American economy have helped fuel a rapid rise of the internet. As traditional manufacturing has shifted to other countries from America, the growth of the technology sector has helped replenish those job losses.1 In general, as opposed to the manufac- turing sector, which adds value to commodities, the technology sector re- lies on adding value to information. Instead of transportation by trucks, barges, or trains, the technology sector relies on the movement of infor- mation over the internet to fuel its operations. Data centers are becoming more commonly used to enable this movement of information.2 In
    [Show full text]
  • CLOUD COMPUTING Also in This Issue: > It Is Cold
    CLOUD COMPUTING Also in this issue: > It Is Cold. And Lonely > Automation and Future Unemployment JUNE 2016 www.computer.org ENDLESS POSSIBILITIES ... AND COUNTLESS RISKS Your technology career gives you both. Be prepared for them with the NEWLY ENHANCED IEEE Member Professional Liability Insurance Program*. From computing and sustainable energy systems, to aerospace, communications, robotics, cybersecurity, biomedical, and more, your career in the technology field ENHANCED offers you endless possibilities. But at the same time, it PROGRAM poses countless risks. No matter how well you design it or how accurate your advice is, you can still be sued. OPTIONS Whether the claim is founded or not, protecting your career, reputation and assets could be costly. That’s why IEEE sponsors a Professional Liability Insurance Program. And now it’s been ENHANCED to offer you more benefits, such as: NEW CHOICE PLATFORM gives you more coverage choices from leading IEEE-approved insurers • Fill out one application to receive multiple quote options** • Computer exposures and technology coverage • Various deductible options • Ideal protection for firms or self-employed individuals • Exclusive member pricing Protect• all your career possibilities from liability risk exposures today. Learn how this enhanced program can help you: 1-800-375-0775 IEEEINSURANCE.COM/NEWPL *The IEEE Member Professional Liability Insurance Program with the Choice Platform is available to active IEEE members who reside in the U.S. IEEE members in Canada Canadian IEEE members can visit www.ieeeinsurance.com/canadapl (excluding Quebec) have access to the IEEE Member Professional Liability Insurance for more information about the insurance program brokered by Plan through Marsh Canada Limited.
    [Show full text]
  • Addressing the Digital Divide in the Joint Statement Initiative on E-Commerce
    Addressing the Digital Divide in the Joint Statement Initiative on E-Commerce: From enabling issues to data and source code provisions December 2020 Leonila Guglya Marilia Maciel © 2020 International Institute for Sustainable Development and CUTS International, Geneva Addressing the Digital Divide in the Joint Statement Initiative on E-Commerce © 2020 International Institute for Sustainable Development and CUTS International, Geneva Published by the International Institute for Sustainable Development INTERNATIONAL INSTITUTE FOR SUSTAINABLE DEVELOPMENT The International Institute for Sustainable Development (IISD) is an independent think tank championing sustainable solutions to 21st–century problems. Our mission is to promote human development and environmental sustainability. We do this through research, analysis and knowledge products that support sound policymaking. Our big-picture view allows us to address the root causes of some of the greatest challenges facing our planet today: ecological destruction, social exclusion, unfair laws and economic rules, a changing climate. IISD’s staff of over 120 people, plus over 50 associates and 100 consultants, come from across the globe and from many disciplines. Our work affects lives in nearly 100 countries. Part scientist, part strategist—IISD delivers the knowledge to act. IISD is registered as a charitable organization in Canada and has 501(c)(3) status in the United States. IISD receives core operating support from the Province of Manitoba and project funding from numerous governments inside and outside of Canada, United Nations agencies, foundations, the private sector, and individuals. CUTS INTERNATIONAL, GENEVA CUTS International, Geneva is a non-profit NGO that catalyses the pro-trade, pro-equity voices of the Global South in international trade and development debates in Geneva.
    [Show full text]
  • MCEA Comment on Hiawatha Campus Expansion Project.Pdf
    Minnesota Center for Environmental Advocacy’s Comments on the City of Minneapolis’ Proposed Hiawatha Campus Expansion Project March 25, 2021 TABLE OF CONTENTS Page INTRODUCTION ...........................................................................................................................1 I. THE EAST PHILLIPS NEIGHBORHOOD DESERVES ENVIRONMENTAL JUSTICE ...................................................................................................................................2 A. East Phillips Is A Polluted Neighborhood Predominately Comprised Of Low-Income, People Of Color. .........................................................................................2 B. The State Legislature Recognizes Environmental Injustice In East Phillips. ...................5 C. The City Must Address Environmental Justice In The EAW. ..........................................6 D. Federal Law Prohibits Disparate Impacts. .........................................................................9 II. THE EAW FAILS TO ADEQUATELY ENGAGE WITH OTHER SOURCES OF POTENTIAL SIGNIFICANT ENVIRONMENTAL EFFECTS ...........................................10 A. The EAW Does Not Adequately Address The Project’s Potential Impacts To Human Health. .................................................................................................................12 B. The EAW Does Not Adequately Discuss Cumulative Potential Effects. .......................14 C. The EAW Fails To Consider Its Contribution To Climate Change. ...............................17
    [Show full text]