Research
Addressing Background Genomic and Environmental Effects on Health through Accelerated Computing and Machine Learning: Results from the 2025 Hackathon at Carnegie Mellon University
S. Sabata, J. Kubica, R. Gupta, L.W. Ericson, H.C. Atanda, G. Subramaniam, ... A. Jha, et al.
In March 2025, 34 scientists from the United States, Ireland, the United Kingdom, Switzerland, France, Germany, Spain, India, and Australia gathered in Pittsburgh, Pennsylvania and virtually for a collaborative biohackathon, hosted by DNAnexus and Carnegie Mellon University...
Harnessing Creative Methods for EEG Feature Extraction and Modeling in Neurological Disorder Diagnoses
A. Jha, N. Kuruvilla, P. Garg, A. Victor
Amidst the rising incidence of neurological disorders detected through electroencephalograms (EEG), this study explores innovative techniques for feature extraction. Analyzing EEG data from 88 subjects across 19 channels, a diverse set of 18 features including Relative Intensity...
Enhancing Visibility: Multiresolution Dark Channel Prior for Dehazing and Fog Removal in Images
P. Garg, A. Jha, S.K. Jindal
Capturing images in conditions marked by fog or smog results in compromised visual quality, characterized by reduced visibility and contrast. Such limitations impede critical tasks like image segmentation, target detection, and video surveillance within outdoor monitoring...
Randomised Analysis of Backtracking-based Search Algorithms in Elucidating Sudoku Puzzles Using a Dual Serial/Parallel Approach
P. Garg, A. Jha, A. Shukla
Sudoku is a 9 x 9 grid-based puzzle. It is a game where each row, column, and 3 x 3 box must have one instance of a number from 1 to 9. In present paper, we shall evaluate three different algorithmic approaches both in serial and parallel configurations that can be utilised to...
Automated Detection Of Driving Pathway Using Image Processing
P. Priyadarshini, A. Jha, M. Raj
Image data is one of the most popular real world input data that can be used for variety of applications ranging from robotics and computer vision to security systems. In combination with other methods such as neural network, Artificial neural network and image processing...