Investigation of a Machine learning methodology for the SKA pulsar search pipeline

09/09/2022
by   Shashank Sanjay Bhat, et al.
0

The SKA pulsar search pipeline will be used for real time detection of pulsars. Modern radio telescopes such as SKA will be generating petabytes of data in their full scale of operation. Hence experience-based and data-driven algorithms become indispensable for applications such as candidate detection. Here we describe our findings from testing a state of the art object detection algorithm called Mask R-CNN to detect candidate signatures in the SKA pulsar search pipeline. We have trained the Mask R-CNN model to detect candidate images. A custom annotation tool was developed to mark the regions of interest in large datasets efficiently. We have successfully demonstrated this algorithm by detecting candidate signatures on a simulation dataset. The paper presents details of this work with a highlight on the future prospects.

READ FULL TEXT

page 5

page 6

page 8

research
05/05/2021

Real-time Face Mask Detection in Video Data

In response to the ongoing COVID-19 pandemic, we present a robust deep l...
research
06/28/2021

Cheating Detection Pipeline for Online Interviews and Exams

Remote examination and job interviews have gained popularity and become ...
research
09/28/2012

A Complete System for Candidate Polyps Detection in Virtual Colonoscopy

Computer tomographic colonography, combined with computer-aided detectio...
research
06/28/2021

Dataset and Benchmarking of Real-Time Embedded Object Detection for RoboCup SSL

When producing a model to object detection in a specific context, the fi...
research
06/28/2021

Object Detection Based Handwriting Localization

We present an object detection based approach to localize handwritten re...
research
03/14/2016

Rapid building detection using machine learning

This work describes algorithms for performing discrete object detection,...
research
03/21/2023

Real-Time Cyberattack Detection with Offline and Online Learning

This paper presents several novel algorithms for real-time cyberattack d...

Please sign up or login with your details

Forgot password? Click here to reset