Ma et al., 2023 - Google Patents
A deep-learning search for technosignatures from 820 nearby starsMa et al., 2023
View PDF- Document ID
- 11584358266545196542
- Author
- Ma P
- Ng C
- Rizk L
- Croft S
- Siemion A
- Brzycki B
- Czech D
- Drew J
- Gajjar V
- Hoang J
- Isaacson H
- Lebofsky M
- MacMahon D
- de Pater I
- Price D
- Sheikh S
- Worden S
- Publication year
- Publication venue
- Nature Astronomy
External Links
Snippet
The goal of the search for extraterrestrial intelligence (SETI) is to quantify the prevalence of technological life beyond Earth via their 'technosignatures'. One theorized technosignature is narrowband Doppler drifting radio signals. The principal challenge in conducting SETI in …
- 238000010801 machine learning 0 abstract description 54
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6261—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation partitioning the feature space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6256—Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00127—Acquiring and recognising microscopic objects, e.g. biological cells and cellular parts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ma et al. | A deep-learning search for technosignatures from 820 nearby stars | |
| Belis et al. | Quantum anomaly detection in the latent space of proton collision events at the LHC | |
| George et al. | Deep Transfer Learning: A new deep learning glitch classification method for advanced LIGO | |
| Felser et al. | Quantum-inspired machine learning on high-energy physics data | |
| Guo et al. | Pulsar candidate classification using generative adversary networks | |
| Golling et al. | The interplay of machine learning-based resonant anomaly detection methods | |
| Subhan et al. | A deep learning‐based approach for software vulnerability detection using code metrics | |
| Bastien et al. | Structured variational inference for simulating populations of radio galaxies | |
| Bykov et al. | DORA: Exploring outlier representations in deep neural networks | |
| Wu et al. | Learning quantum properties from short-range correlations using multi-task networks | |
| Huang et al. | EMA: Auditing data removal from trained models | |
| Pettee et al. | Weakly supervised anomaly detection in the Milky Way | |
| Geissler et al. | A low-cost strategic monitoring approach for scalable and interpretable error detection in deep neural networks | |
| Devlin et al. | Disentangled attribution curves for interpreting random forests and boosted trees | |
| Yao et al. | Empowering graph invariance learning with deep spurious infomax | |
| La Rosa et al. | A self-interpretable module for deep image classification on small data | |
| Leuzzi et al. | Euclid preparation-XXXIII. Characterization of convolutional neural networks for the identification of galaxy-galaxy strong-lensing events | |
| Alam et al. | Social media images classification models for real-time disaster response | |
| Amirian et al. | Two to trust: Automl for safe modelling and interpretable deep learning for robustness | |
| Demir et al. | Test selection for deep neural networks using meta-models with uncertainty metrics | |
| Väth et al. | Diffusion-Based Visual Counterfactual Explanations-Towards Systematic Quantitative Evaluation | |
| Guo et al. | Pulsar candidate identification with artificial intelligence techniques | |
| Vikkurty et al. | Effective prediction of brain tumor using machine learning algorithms | |
| Vasishth et al. | Enhanced software defect prediction using krill herd algorithm with stacked LSTM with attention mechanism | |
| Ma et al. | The first deep-learning search for radio technosignatures from 820 nearby stars |