-
Recompression Based JPEG Tamper Detection and Localization Using Deep Neural Network Eliminating Compression Factor Dependency
Authors:
Jamimamul Bakas,
Praneta Rawat,
Kalyan Kokkalla,
Ruchira Naskar
Abstract:
In this work, we deal with the problem of re compression based image forgery detection, where some regions of an image are modified illegitimately, hence giving rise to presence of dual compression characteristics within a single image. There have been some significant researches in this direction, in the last decade. However, almost all existing techniques fail to detect this form of forgery, whe…
▽ More
In this work, we deal with the problem of re compression based image forgery detection, where some regions of an image are modified illegitimately, hence giving rise to presence of dual compression characteristics within a single image. There have been some significant researches in this direction, in the last decade. However, almost all existing techniques fail to detect this form of forgery, when the first compression factor is greater than the second. We address this problem in re compression based forgery detection, here Recently, Machine Learning techniques have started gaining a lot of importance in the domain of digital image forensics. In this work, we propose a Convolution Neural Network based deep learning architecture, which is capable of detecting the presence of re compression based forgery in JPEG images. The proposed architecture works equally efficiently, even in cases where the first compression ratio is greater than the second. In this work, we also aim to localize the regions of image manipulation based on re compression features, using the trained neural network. Our experimental results prove that the proposed method outperforms the state of the art, with respect to forgery detection and localization accuracy.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
A Deep Learning Approach to Heterogeneous Consumer Aesthetics in Retail Fashion
Authors:
Pranjal Rawat
Abstract:
In some markets, the visual appearance of a product matters a lot. This paper investigates consumer transactions from a major fashion retailer, focusing on consumer aesthetics. Pretrained multimodal models convert images and text descriptions into high-dimensional embeddings. The value of these embeddings is verified both empirically and by their ability to segment the product space. A discrete ch…
▽ More
In some markets, the visual appearance of a product matters a lot. This paper investigates consumer transactions from a major fashion retailer, focusing on consumer aesthetics. Pretrained multimodal models convert images and text descriptions into high-dimensional embeddings. The value of these embeddings is verified both empirically and by their ability to segment the product space. A discrete choice model is used to decompose the distinct drivers of consumer choice: price, visual aesthetics, descriptive details, and seasonal variations. Consumers are allowed to differ in their preferences over these factors, both through observed variation in demographics and allowing for unobserved types. Estimation and inference employ automatic differentiation and GPUs, making it scalable and portable. The model reveals significant differences in price sensitivity and aesthetic preferences across consumers. The model is validated by its ability to predict the relative success of new designs and purchase patterns.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Designing Auctions when Algorithms Learn to Bid: The critical role of Payment Rules
Authors:
Pranjal Rawat
Abstract:
This paper examines the impact of different payment rules on efficiency when algorithms learn to bid. We use a fully randomized experiment of 427 trials, where Q-learning bidders participate in up to 250,000 auctions for a commonly valued item. The findings reveal that the first price auction, where winners pay the winning bid, is susceptible to coordinated bid suppression, with winning bids avera…
▽ More
This paper examines the impact of different payment rules on efficiency when algorithms learn to bid. We use a fully randomized experiment of 427 trials, where Q-learning bidders participate in up to 250,000 auctions for a commonly valued item. The findings reveal that the first price auction, where winners pay the winning bid, is susceptible to coordinated bid suppression, with winning bids averaging roughly 20% below the true values. In contrast, the second price auction, where winners pay the second highest bid, aligns winning bids with actual values, reduces the volatility during learning and speeds up convergence. Regression analysis, incorporating design elements such as payment rules, number of participants, algorithmic factors including the discount and learning rate, asynchronous/synchronous updating, feedback, and exploration strategies, discovers the critical role of payment rules on efficiency. Furthermore, machine learning estimators find that payment rules matter even more with few bidders, high discount factors, asynchronous learning, and coarse bid spaces. This paper underscores the importance of auction design in algorithmic bidding. It suggests that computerized auctions like Google AdSense, which rely on the first price auction, can mitigate the risk of algorithmic collusion by adopting the second price auction.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Knowledge Injected Prompt Based Fine-tuning for Multi-label Few-shot ICD Coding
Authors:
Zhichao Yang,
Shufan Wang,
Bhanu Pratap Singh Rawat,
Avijit Mitra,
Hong Yu
Abstract:
Automatic International Classification of Diseases (ICD) coding aims to assign multiple ICD codes to a medical note with average length of 3,000+ tokens. This task is challenging due to a high-dimensional space of multi-label assignment (tens of thousands of ICD codes) and the long-tail challenge: only a few codes (common diseases) are frequently assigned while most codes (rare diseases) are infre…
▽ More
Automatic International Classification of Diseases (ICD) coding aims to assign multiple ICD codes to a medical note with average length of 3,000+ tokens. This task is challenging due to a high-dimensional space of multi-label assignment (tens of thousands of ICD codes) and the long-tail challenge: only a few codes (common diseases) are frequently assigned while most codes (rare diseases) are infrequently assigned. This study addresses the long-tail challenge by adapting a prompt-based fine-tuning technique with label semantics, which has been shown to be effective under few-shot setting. To further enhance the performance in medical domain, we propose a knowledge-enhanced longformer by injecting three domain-specific knowledge: hierarchy, synonym, and abbreviation with additional pretraining using contrastive learning. Experiments on MIMIC-III-full, a benchmark dataset of code assignment, show that our proposed method outperforms previous state-of-the-art method in 14.5% in marco F1 (from 10.3 to 11.8, P<0.001). To further test our model on few-shot setting, we created a new rare diseases coding dataset, MIMIC-III-rare50, on which our model improves marco F1 from 17.1 to 30.4 and micro F1 from 17.2 to 32.6 compared to previous method.
△ Less
Submitted 12 October, 2022; v1 submitted 6 October, 2022;
originally announced October 2022.
-
It Isn't Sh!tposting, It's My CAT Posting
Authors:
Parthsarthi Rawat,
Sayan Das,
Jorge Aguirre,
Akhil Daphara
Abstract:
In this paper, we describe a novel architecture which can generate hilarious captions for a given input image. The architecture is split into two halves, i.e. image captioning and hilarious text conversion. The architecture starts with a pre-trained CNN model, VGG16 in this implementation, and applies attention LSTM on it to generate normal caption. These normal captions then are fed forward to ou…
▽ More
In this paper, we describe a novel architecture which can generate hilarious captions for a given input image. The architecture is split into two halves, i.e. image captioning and hilarious text conversion. The architecture starts with a pre-trained CNN model, VGG16 in this implementation, and applies attention LSTM on it to generate normal caption. These normal captions then are fed forward to our hilarious text conversion transformer which converts this text into something hilarious while maintaining the context of the input image. The architecture can also be split into two halves and only the seq2seq transformer can be used to generate hilarious caption by inputting a sentence.This paper aims to help everyday user to be more lazy and hilarious at the same time by generating captions using CATNet.
△ Less
Submitted 18 May, 2022;
originally announced May 2022.
-
ScAN: Suicide Attempt and Ideation Events Dataset
Authors:
Bhanu Pratap Singh Rawat,
Samuel Kovaly,
Wilfred R. Pigeon,
Hong Yu
Abstract:
Suicide is an important public health concern and one of the leading causes of death worldwide. Suicidal behaviors, including suicide attempts (SA) and suicide ideations (SI), are leading risk factors for death by suicide. Information related to patients' previous and current SA and SI are frequently documented in the electronic health record (EHR) notes. Accurate detection of such documentation m…
▽ More
Suicide is an important public health concern and one of the leading causes of death worldwide. Suicidal behaviors, including suicide attempts (SA) and suicide ideations (SI), are leading risk factors for death by suicide. Information related to patients' previous and current SA and SI are frequently documented in the electronic health record (EHR) notes. Accurate detection of such documentation may help improve surveillance and predictions of patients' suicidal behaviors and alert medical professionals for suicide prevention efforts. In this study, we first built Suicide Attempt and Ideation Events (ScAN) dataset, a subset of the publicly available MIMIC III dataset spanning over 12k+ EHR notes with 19k+ annotated SA and SI events information. The annotations also contain attributes such as method of suicide attempt. We also provide a strong baseline model ScANER (Suicide Attempt and Ideation Events Retriever), a multi-task RoBERTa-based model with a retrieval module to extract all the relevant suicidal behavioral evidences from EHR notes of an hospital-stay and, and a prediction module to identify the type of suicidal behavior (SA and SI) concluded during the patient's stay at the hospital. ScANER achieved a macro-weighted F1-score of 0.83 for identifying suicidal behavioral evidences and a macro F1-score of 0.78 and 0.60 for classification of SA and SI for the patient's hospital-stay, respectively. ScAN and ScANER are publicly available.
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
AntBO: Towards Real-World Automated Antibody Design with Combinatorial Bayesian Optimisation
Authors:
Asif Khan,
Alexander I. Cowen-Rivers,
Antoine Grosnit,
Derrick-Goh-Xin Deik,
Philippe A. Robert,
Victor Greiff,
Eva Smorodina,
Puneet Rawat,
Kamil Dreczkowski,
Rahmad Akbar,
Rasul Tutunov,
Dany Bou-Ammar,
Jun Wang,
Amos Storkey,
Haitham Bou-Ammar
Abstract:
Antibodies are canonically Y-shaped multimeric proteins capable of highly specific molecular recognition. The CDRH3 region located at the tip of variable chains of an antibody dominates antigen-binding specificity. Therefore, it is a priority to design optimal antigen-specific CDRH3 regions to develop therapeutic antibodies. However, the combinatorial nature of CDRH3 sequence space makes it imposs…
▽ More
Antibodies are canonically Y-shaped multimeric proteins capable of highly specific molecular recognition. The CDRH3 region located at the tip of variable chains of an antibody dominates antigen-binding specificity. Therefore, it is a priority to design optimal antigen-specific CDRH3 regions to develop therapeutic antibodies. However, the combinatorial nature of CDRH3 sequence space makes it impossible to search for an optimal binding sequence exhaustively and efficiently using computational approaches. Here, we present \texttt{AntBO}: a combinatorial Bayesian optimisation framework enabling efficient \textit{in silico} design of the CDRH3 region. Ideally, antibodies are expected to have high target specificity and developability. We introduce a CDRH3 trust region that restricts the search to sequences with favourable developability scores to achieve this goal. For benchmarking, \texttt{AntBO} uses the \texttt{Absolut!} software suite as a black-box oracle to score the target specificity and affinity of designed antibodies \textit{in silico} in an unconstrained fashion~\citep{robert2021one}. The experiments performed for $159$ discretised antigens used in \texttt{Absolut!} demonstrate the benefit of \texttt{AntBO} in designing CDRH3 regions with diverse biophysical properties. In under $200$ calls to black-box oracle, \texttt{AntBO} can suggest antibody sequences that outperform the best binding sequence drawn from 6.9 million experimentally obtained CDRH3s and a commonly used genetic algorithm baseline. Additionally, \texttt{AntBO} finds very-high affinity CDRH3 sequences in only 38 protein designs whilst requiring no domain knowledge. We conclude \texttt{AntBO} brings automated antibody design methods closer to what is practically viable for in vitro experimentation.
△ Less
Submitted 14 October, 2022; v1 submitted 29 January, 2022;
originally announced January 2022.
-
Membership Inference Attack Susceptibility of Clinical Language Models
Authors:
Abhyuday Jagannatha,
Bhanu Pratap Singh Rawat,
Hong Yu
Abstract:
Deep Neural Network (DNN) models have been shown to have high empirical privacy leakages. Clinical language models (CLMs) trained on clinical data have been used to improve performance in biomedical natural language processing tasks. In this work, we investigate the risks of training-data leakage through white-box or black-box access to CLMs. We design and employ membership inference attacks to es…
▽ More
Deep Neural Network (DNN) models have been shown to have high empirical privacy leakages. Clinical language models (CLMs) trained on clinical data have been used to improve performance in biomedical natural language processing tasks. In this work, we investigate the risks of training-data leakage through white-box or black-box access to CLMs. We design and employ membership inference attacks to estimate the empirical privacy leaks for model architectures like BERT and GPT2. We show that membership inference attacks on CLMs lead to non-trivial privacy leakages of up to 7%. Our results show that smaller models have lower empirical privacy leakages than larger ones, and masked LMs have lower leakages than auto-regressive LMs. We further show that differentially private CLMs can have improved model utility on clinical domain while ensuring low empirical privacy leakage. Lastly, we also study the effects of group-level membership inference and disease rarity on CLM privacy leakages.
△ Less
Submitted 16 April, 2021;
originally announced April 2021.
-
Conversational Machine Comprehension: a Literature Review
Authors:
Somil Gupta,
Bhanu Pratap Singh Rawat,
Hong Yu
Abstract:
Conversational Machine Comprehension (CMC), a research track in conversational AI, expects the machine to understand an open-domain natural language text and thereafter engage in a multi-turn conversation to answer questions related to the text. While most of the research in Machine Reading Comprehension (MRC) revolves around single-turn question answering (QA), multi-turn CMC has recently gained…
▽ More
Conversational Machine Comprehension (CMC), a research track in conversational AI, expects the machine to understand an open-domain natural language text and thereafter engage in a multi-turn conversation to answer questions related to the text. While most of the research in Machine Reading Comprehension (MRC) revolves around single-turn question answering (QA), multi-turn CMC has recently gained prominence, thanks to the advancement in natural language understanding via neural language models such as BERT and the introduction of large-scale conversational datasets such as CoQA and QuAC. The rise in interest has, however, led to a flurry of concurrent publications, each with a different yet structurally similar modeling approach and an inconsistent view of the surrounding literature. With the volume of model submissions to conversational datasets increasing every year, there exists a need to consolidate the scattered knowledge in this domain to streamline future research. This literature review attempts at providing a holistic overview of CMC with an emphasis on the common trends across recently published models, specifically in their approach to tackling conversational history. The review synthesizes a generic framework for CMC models while highlighting the differences in recent approaches and intends to serve as a compendium of CMC for future researchers.
△ Less
Submitted 5 November, 2020; v1 submitted 31 May, 2020;
originally announced June 2020.
-
Entity-Enriched Neural Models for Clinical Question Answering
Authors:
Bhanu Pratap Singh Rawat,
Wei-Hung Weng,
So Yeon Min,
Preethi Raghavan,
Peter Szolovits
Abstract:
We explore state-of-the-art neural models for question answering on electronic medical records and improve their ability to generalize better on previously unseen (paraphrased) questions at test time. We enable this by learning to predict logical forms as an auxiliary task along with the main task of answer span detection. The predicted logical forms also serve as a rationale for the answer. Furth…
▽ More
We explore state-of-the-art neural models for question answering on electronic medical records and improve their ability to generalize better on previously unseen (paraphrased) questions at test time. We enable this by learning to predict logical forms as an auxiliary task along with the main task of answer span detection. The predicted logical forms also serve as a rationale for the answer. Further, we also incorporate medical entity information in these models via the ERNIE architecture. We train our models on the large-scale emrQA dataset and observe that our multi-task entity-enriched models generalize to paraphrased questions ~5% better than the baseline BERT model.
△ Less
Submitted 19 February, 2021; v1 submitted 13 May, 2020;
originally announced May 2020.
-
Continual Domain-Tuning for Pretrained Language Models
Authors:
Subendhu Rongali,
Abhyuday Jagannatha,
Bhanu Pratap Singh Rawat,
Hong Yu
Abstract:
Pre-trained language models (LM) such as BERT, DistilBERT, and RoBERTa can be tuned for different domains (domain-tuning) by continuing the pre-training phase on a new target domain corpus. This simple domain tuning (SDT) technique has been widely used to create domain-tuned models such as BioBERT, SciBERT and ClinicalBERT. However, during the pretraining phase on the target domain, the LM models…
▽ More
Pre-trained language models (LM) such as BERT, DistilBERT, and RoBERTa can be tuned for different domains (domain-tuning) by continuing the pre-training phase on a new target domain corpus. This simple domain tuning (SDT) technique has been widely used to create domain-tuned models such as BioBERT, SciBERT and ClinicalBERT. However, during the pretraining phase on the target domain, the LM models may catastrophically forget the patterns learned from their source domain. In this work, we study the effects of catastrophic forgetting on domain-tuned LM models and investigate methods that mitigate its negative effects. We propose continual learning (CL) based alternatives for SDT, that aim to reduce catastrophic forgetting. We show that these methods may increase the performance of LM models on downstream target domain tasks. Additionally, we also show that constraining the LM model from forgetting the source domain leads to downstream task models that are more robust to domain shifts. We analyze the computational cost of using our proposed CL methods and provide recommendations for computationally lightweight and effective CL domain-tuning procedures.
△ Less
Submitted 19 March, 2021; v1 submitted 5 April, 2020;
originally announced April 2020.
-
End-to-End Resume Parsing and Finding Candidates for a Job Description using BERT
Authors:
Vedant Bhatia,
Prateek Rawat,
Ajit Kumar,
Rajiv Ratn Shah
Abstract:
The ever-increasing number of applications to job positions presents a challenge for employers to find suitable candidates manually. We present an end-to-end solution for ranking candidates based on their suitability to a job description. We accomplish this in two stages. First, we build a resume parser which extracts complete information from candidate resumes. This parser is made available to th…
▽ More
The ever-increasing number of applications to job positions presents a challenge for employers to find suitable candidates manually. We present an end-to-end solution for ranking candidates based on their suitability to a job description. We accomplish this in two stages. First, we build a resume parser which extracts complete information from candidate resumes. This parser is made available to the public in the form of a web application. Second, we use BERT sentence pair classification to perform ranking based on their suitability to the job description. To approximate the job description, we use the description of past job experiences by a candidate as mentioned in his resume. Our dataset comprises resumes in LinkedIn format and general non-LinkedIn formats. We parse the LinkedIn resumes with 100\% accuracy and establish a strong baseline of 73\% accuracy for candidate suitability.
△ Less
Submitted 15 October, 2019; v1 submitted 30 September, 2019;
originally announced October 2019.
-
Group Affect Prediction Using Multimodal Distributions
Authors:
Saqib Shamsi,
Bhanu Pratap Singh Rawat,
Manya Wadhwa
Abstract:
We describe our approach towards building an efficient predictive model to detect emotions for a group of people in an image. We have proposed that training a Convolutional Neural Network (CNN) model on the emotion heatmaps extracted from the image, outperforms a CNN model trained entirely on the raw images. The comparison of the models have been done on a recently published dataset of Emotion Rec…
▽ More
We describe our approach towards building an efficient predictive model to detect emotions for a group of people in an image. We have proposed that training a Convolutional Neural Network (CNN) model on the emotion heatmaps extracted from the image, outperforms a CNN model trained entirely on the raw images. The comparison of the models have been done on a recently published dataset of Emotion Recognition in the Wild (EmotiW) challenge, 2017. The proposed method achieved validation accuracy of 55.23% which is 2.44% above the baseline accuracy, provided by the EmotiW organizers.
△ Less
Submitted 12 March, 2018; v1 submitted 17 September, 2017;
originally announced October 2017.
-
FMEA Based Risk Assessment of Component Failure Modes in Industrial Radiography
Authors:
Alok Pandey,
Meghraj Singh,
A. U. Sonawane,
Prashant S. Rawat
Abstract:
Industrial radiography has its inimitable role in non-destructive examinations. Industrial radiography devices, consisting of significantly high activity of the radioisotopes, are operated manually by remotely held control unit. Malfunctioning of these devices may cause potential exposure to the operator and nearby public, and thus should be practiced under a systematic risk control. To ensure the…
▽ More
Industrial radiography has its inimitable role in non-destructive examinations. Industrial radiography devices, consisting of significantly high activity of the radioisotopes, are operated manually by remotely held control unit. Malfunctioning of these devices may cause potential exposure to the operator and nearby public, and thus should be practiced under a systematic risk control. To ensure the radiation safety, proactive risk assessment should be implemented. Risk assessment in industrial radiography using the Failure Modes & Effect Analysis (FMEA) for the design and operation of industrial radiography exposure devices has been carried out in this study. Total 56 component failure modes were identified and Risk Priority Numbers (RPNs) were assigned by the FMEA expert team, based on the field experience and reported failure data of various components. Results shows all the identified failure modes have RPN in the range of 04 to 216 and most of the higher RPN are due to low detectability and high severity levels. Assessment reveals that increasing failure detectability is a practical and feasible approach to reduce the risk in most of the failure modes of industrial radiography devices. Actions for reducing RPN for each failure mode have been suggested. Feasibility of FMEA for risk assessment in industrial radiography has been established by this study
△ Less
Submitted 5 October, 2016;
originally announced October 2016.
-
Can Evolutionary Sampling Improve Bagged Ensembles?
Authors:
Harsh Nisar,
Bhanu Pratap Singh Rawat
Abstract:
Perturb and Combine (P&C) group of methods generate multiple versions of the predictor by perturbing the training set or construction and then combining them into a single predictor (Breiman, 1996b). The motive is to improve the accuracy in unstable classification and regression methods. One of the most well known method in this group is Bagging. Arcing or Adaptive Resampling and Combining methods…
▽ More
Perturb and Combine (P&C) group of methods generate multiple versions of the predictor by perturbing the training set or construction and then combining them into a single predictor (Breiman, 1996b). The motive is to improve the accuracy in unstable classification and regression methods. One of the most well known method in this group is Bagging. Arcing or Adaptive Resampling and Combining methods like AdaBoost are smarter variants of P&C methods. In this extended abstract, we lay the groundwork for a new family of methods under the P&C umbrella, known as Evolutionary Sampling (ES). We employ Evolutionary algorithms to suggest smarter sampling in both the feature space (sub-spaces) as well as training samples. We discuss multiple fitness functions to assess ensembles and empirically compare our performance against randomized sampling of training data and feature sub-spaces.
△ Less
Submitted 3 October, 2016;
originally announced October 2016.
-
Development of high power quantum well lasers at RRCAT
Authors:
T. K. Sharma,
Tapas Ganguli,
V. K. Dixit,
S. D. Singh,
S. Pal,
S. Porwal,
Ravi Kumar,
Alexander Khakha,
R. Jangir,
V. Kheraj,
P. Rawat,
A. K. Nath
Abstract:
We at RRCAT have recently developed high power laser diodes in the wavelength range of 740 to 1000 nm. A typical semiconductor laser structure is consisted of about 10 epilayers with different composition, thickness and do** values. For example, a laser diode operating at 0.8 micron has either GaAs or GaAsP quantum well as an active layer. The quantum well is sandwiched between AlGaAs wider band…
▽ More
We at RRCAT have recently developed high power laser diodes in the wavelength range of 740 to 1000 nm. A typical semiconductor laser structure is consisted of about 10 epilayers with different composition, thickness and do** values. For example, a laser diode operating at 0.8 micron has either GaAs or GaAsP quantum well as an active layer. The quantum well is sandwiched between AlGaAs wider bandgap waveguide and cladding layers. The complete laser structure is grown by metal organic vapour phase epitaxy technique and devices are fabricated through standard procedure using photolithography. We recently achieved about 5.3 Watt peak power at 853 nm. These laser diodes were tested under pulsed operation at room temperature for 500 nanosecond pulse duration with a duty cycle of 1:1000. Laser diode arrays consisting of 6-10 elements were also developed and tested for operation in pulsed mode at room temperature.
△ Less
Submitted 4 December, 2014;
originally announced December 2014.
-
Lazy Pointer Analysis
Authors:
Uday P. Khedker,
Alan Mycroft,
Prashant Singh Rawat
Abstract:
Flow- and context-sensitive pointer analysis is generally considered too expensive for large programs; most tools relax one or both of the requirements for scalability. We formulate a flow- and context-sensitive points-to analysis that is lazy in the following sense: points-to information is computed only for live pointers and its propagation is sparse (restricted to live ranges of respective poin…
▽ More
Flow- and context-sensitive pointer analysis is generally considered too expensive for large programs; most tools relax one or both of the requirements for scalability. We formulate a flow- and context-sensitive points-to analysis that is lazy in the following sense: points-to information is computed only for live pointers and its propagation is sparse (restricted to live ranges of respective pointers). Further, our analysis (a) uses strong liveness, effectively including dead code elimination; (b) afterwards calculates must-points-to information from may-points-to information instead of using a mutual fixed-point; and (c) uses value-based termination of call strings during interprocedural analysis (which reduces the number of call strings significantly).
A naive implementation of our analysis within GCC-4.6.0 gave analysis time and size of points-to measurements for SPEC2006. Using liveness reduced the amount of points-to information by an order of magnitude with no loss of precision. For all programs under 30kLoC we found that the results were much more precise than gcc's analysis. What comes as a pleasant surprise however, is the fact that below this cross-over point, our naive linked-list implementation is faster than a flow- and context-insensitive analysis which is primarily used for efficiency. We speculate that lazy flow- and context-sensitive analyses may be not only more precise, but also more efficient, than current approaches.
△ Less
Submitted 21 December, 2011;
originally announced December 2011.
-
A multi-wavelength census of stellar contents in the young cluster NGC 1624
Authors:
Jessy Jose,
A. K. Pandey,
K. Ogura,
D. K. Ojha,
B. C. Bhatt,
M. R. Samal,
N. Chauhan,
D. K Sahu,
P. S. Rawat
Abstract:
We present a comprehensive multi-wavelength analysis of the young cluster NGC 1624 associated with the H II region Sh2-212 using optical UBVRI photometry, optical spectroscopy and GMRT radio continuum map** along with the near-infrared (NIR) JHK archival data. Reddening E(B-V) and distance to the cluster are estimated to be 0.76 - 1.00 mag and 6.0 +/- 0.8 kpc, respectively. Present analysis yiel…
▽ More
We present a comprehensive multi-wavelength analysis of the young cluster NGC 1624 associated with the H II region Sh2-212 using optical UBVRI photometry, optical spectroscopy and GMRT radio continuum map** along with the near-infrared (NIR) JHK archival data. Reddening E(B-V) and distance to the cluster are estimated to be 0.76 - 1.00 mag and 6.0 +/- 0.8 kpc, respectively. Present analysis yields a spectral class of O6.5V for the main ionizing source of the region. The distribution of YSOs in (J-H)/ (H-K) NIR colour-colour diagram shows that a majority of them have A_V $\le$ 4 mag. Based on the NIR excess characteristics, we identified 120 probable candidate YSOs in this region which yield a disk frequency of ~ 20%. These YSOs are found to have an age spread of ~ 5 Myr with a median age of ~ 2-3 Myr and a mass range of ~ 0.1 - 3.0 $M_\odot$. A significant number of YSOs are located close to the cluster centre and we detect an enhanced density of reddened YSOs located/projected close to the molecular clumps at the periphery of NGC 1624. This indicates that the YSOs located within the cluster core are relatively older in comparison to those located/projected near the clumps. From the radio continuum flux, spectral class of the ionizing source of the ultra-compact H II region at the periphery of Sh2-212 is estimated to be ~ B0.5V. From optical data, slope of the mass function (MF) $Γ$, in the mass range $1.2 \le M/M_{\odot}<27$ can be represented by a single power law with a slope -1.18 +/- 0.10, whereas the NIR data in the mass range $0.65 \le M/M_{\odot}<27$ yields $Γ$ = -1.31 +/- 0.15. The slope of the K-band luminosity function (KLF) for the cluster is found to be 0.30 +/- 0.06 which is in agreement with the values obtained for other young clusters.
△ Less
Submitted 11 October, 2010;
originally announced October 2010.
-
Triggered Star Formation and Evolution of T-Tauri stars in and around Bright-Rimmed Clouds
Authors:
Neelam Chauhan,
A. K. Pandey,
K. Ogura,
D. K. Ojha,
B. C. Bhatt,
S. K. Ghosh,
P. S. Rawat
Abstract:
The aim of this paper is to quantitatively testify the "{\it small-scale sequential star formation}" hypothesis in and around bright-rimmed clouds (BRCs). As a continuation of the recent attempt by Ogura et al. (2007, Paper I), we have carried out $BVI_{c}$ photometry of four more BRC aggregates along with deeper re-observations of 2 previously observed BRCs. Again quantitative age gradients are…
▽ More
The aim of this paper is to quantitatively testify the "{\it small-scale sequential star formation}" hypothesis in and around bright-rimmed clouds (BRCs). As a continuation of the recent attempt by Ogura et al. (2007, Paper I), we have carried out $BVI_{c}$ photometry of four more BRC aggregates along with deeper re-observations of 2 previously observed BRCs. Again quantitative age gradients are found in almost all the BRCs studied in the present work. Archival Spitzer/IRAC data also support this result. The global distribution of NIR excess stars in each HII region studied here clearly shows evidence that a series of radiation driven implosion (RDI) processes proceeded in the past from near the central O star(s) towards the peripheries of the HII region. We found that in general weak-line T-Tauri stars (WTTSs) are somewhat older than classical T-Tauri stars (CTTSs). Also the fraction of CTTSs among the T-Tauri stars (TTSs) associated with the BRCs is found to decrease with age. These facts are in accordance with the recent conclusion by Bertout et al. (2007) that CTTSs evolve into WTTSs. It seems that in general the EW of H$α$ emission in TTSs associated with the BRCs decreases with age. The mass function (MF) of the aggregates associated with the BRCs of the morphological type "A" seems to follow that found in young open clusters, whereas "B/C" type BRCs show significantly steeper MF.
△ Less
Submitted 12 March, 2009;
originally announced March 2009.