Faculty Mr Sugyan Kumar Mishra

Mr Sugyan Kumar Mishra

Assistant Professor

Department of Computer Science and Engineering

Contact Details

sugyankumar.m@srmap.edu.in

Office Location

Homi J Bhabha Block, Level 4, Cubicle No: 44

Education

2024
National Institute of Technology Durgapur, Durgapur, West Bengal
India
2016
M.Tech
Veer Surendra Sai University of Technology Burla Sambalpur Odisha
India
2014
B.Tech
Biju Patnaik University of Technology Rourkela, Odisha
India

Personal Website

Experience

  • 2016-2018 – Assistant Professor – C.V. Raman Global University, Bhubaneswar, Odisha

Research Interest

  • Software Architecture
  • Service-Oriented Architecture
  • Service Composition
  • Healthcare

Awards

  • [2018-2023] – Institute Fellowship – Ministry of Education
  • [2016] – Got 2nd prize in paper presentation event in SRUJAN 2016 at VSSUT, Burla
  • [2013] – Got highest attendance prize in 6th semester of B.Tech
  • [2007]- Passed the exam in NCC in school level in grade ‘A’

Memberships

  • IEEE Student Member (Id No. 95565715)

Publications

  • Tomato Leaf Disease Detection Using Deep Learning and Machine Learning

    Chebrolu M., Garikapati K., Veeramachaneni Y., Annabathina J., Mishra S.K., Mishra S.K.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    Detecting diseases in tomato leaves at an early stage is crucial for preventing crop damage and improving food security. Traditional diagnostic methods are often inefficient, requiring significant expertise and time. To address this challenge, we explore AI-driven approaches, integrating DL and ML methods for automated disease detection. This study employs CNNs, specifically leveraging the VGG16 architecture for feature extraction. Additionally, we compare its effectiveness with classical classifiers such as KNN and SVM. Using a publicly available dataset of healthy and diseased tomato leaves, our results indicate that CNN-based models outperform conventional machine learning classifiers in both accuracy and efficiency. Moreover, integrating IoT-based analytics enhances early detection, reducing crop losses and promoting sustainable agricultural practices.
  • Enhancing Heart Disease Prediction with Data Augmentation and ML Classifiers

    Rachapalli V.K., Meenavalli C., Nunna S.P., Yarramaneni P., Mishra S.K., Mishra S.K.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    Heart disease is a significant cause of death worldwide, and early prediction is vital for prevention and treatment. This project uses the Framingham Heart Study dataset for the early prediction of Coronary Heart Disease (CHD) using machine learning methods. The Framingham Heart Study is a highly unbalanced dataset, with only 16 % cases of CHD, which impacts the accuracy of the model. To overcome this, data augmentation techniques such as SMOTE and cGAN are applied to create synthetic cases of CHD. The machine learning algorithms that are compared: Random Forest, XGBoost, SVM, and MLP. XGBoost has achieved the highest AUC-ROC of 0.973 when cGAN-augmented data is used, while cGAN-augmented data improves recall and overall model performance significantly. This study identifies the potential for combining machine learning with data augmentation to improve CHD prediction.
  • Trading Strategy with EMA’s and Risk Management

    Pranav Somisetty S.D., Jagadishwar Gatte S., Kosuri N.B., Gowrish Chinta L., Mishra S.K., Kumar Mishra S.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    The trading world often appears mysterious, filled with stories of fear, hope, addiction, and occasional profits. However, many fail to recognize that consistent profitability in trading is driven by discipline, a well-defined strategy, and strict adherence to rules. This lack of awareness is a key reason why 75-90% of new traders enter the market with high expectations but end up losing their hard-earned money. In this research we propose a quantitative trading strategy based on exponential moving average (EMA) crossovers, volume analysis, and structured profit booking. The strategy utilises a short-term 9-period EMA and along-term 15-period EMA to identify trend reversals, generating buy signals when the two different EMA's crosses under some conditions and sell signals are generated when the opposite occurs. Meanwhile, a confirmation mechanism is introduced, requiring the price to move at least 0.06% above the crossover price while ensuring the crossover candle remains bullish. Additionally, volume conditions are incorporated to validate momentum, ensuring buy signals are triggered only when the trading volume increases in ascending order. To optimize trade management, a multi-tier profit booking system is implemented, allowing partial exits at predefined levels. which ensures that the traders secure gains while allowing profitable trades to run. The strategy's performance is evaluated through historical back-testing, assessing profitability, accuracy, and risk-reward dynamics. The results demonstrate the effectiveness of integrating EMA crossings with volumes and structured exit points in improving trade success rates. This might become the future of so many people to convert their portfolio from a losing streak to a winning streak.
  • Application of blockchain for secured edge computing system

    Dash A., Sahoo S.K., Mishra S.K., Mishra S.K.

    Book chapter, Cybersecurity Defensive Walls in Edge Computing, 2025, DOI Link

    View abstract ⏷

    Edge computing has become a game-changing technology in both academics and industry as the need for quicker and more effective data processing increases. Edge computing lowers latency and improves real-time analysis by processing and storing data close to its source. The increasing significance of edge computing in the current Information Technology architecture demands the critical need to secure its distributed nature. The integration of blockchain-based technologies with edge computing will be addressed in this chapter. Blockchain and edge computing integration can improve security. At the network edge, blockchain technology guarantees data integrity, authentication, and confidentiality. Secure access control mechanisms for distributed resources are made possible by this integration. It reduces the possibility of single points of failure or concentrated attacks or malicious attacks. Furthermore, it makes tamper-proof transactions possible by utilizing widespread acceptance technique like smart contracts. This technology is used as a strategic approach to improve edge computing systems' security architecture. Key security concerns including data integrity, privacy, and access management are addressed by blockchain. This is known for its decentralization, cryptographic integrity, and elimination of middlemen. These issues are made worse by the distributed nature of edge computing. This analysis, which is based on a thorough examination of the literature, emphasizes how blockchain technology may be used in edge contexts to enforce data protection, guarantee transparency, and provide trustworthy audit trails.

Patents

  • A dynamic time quantum-based task scheduling system and method for  vehicular edge computing (vec)

    Mr Sugyan Kumar Mishra, Mr M Ratna Raju, Dr Sambit Kumar Mishra

    Patent Application No: 202441073304, Date Filed: 27/09/2024, Date Published: 04/10/2024, Status: Published

  • A Signal Processing System For Detection And Confirmation Of Pattern-Based Events And A Method Thereof

    Mr Sugyan Kumar Mishra, Dr Sambit Kumar Mishra

    Patent Application No: 202541055915, Date Filed: 10/06/2025, Date Published: 20/06/2025, Status: Published

Projects

Scholars

Interests

Thought Leaderships

There are no Thought Leaderships associated with this faculty.

Top Achievements

Research Area

No research areas found for this faculty.

Recent Updates

No recent updates found.

Education
2014
B.Tech
Biju Patnaik University of Technology Rourkela, Odisha
India
2016
M.Tech
Veer Surendra Sai University of Technology Burla Sambalpur Odisha
India
2024
National Institute of Technology Durgapur, Durgapur, West Bengal
India
Experience
  • 2016-2018 – Assistant Professor – C.V. Raman Global University, Bhubaneswar, Odisha
Research Interests
  • Software Architecture
  • Service-Oriented Architecture
  • Service Composition
  • Healthcare
Awards & Fellowships
  • [2018-2023] – Institute Fellowship – Ministry of Education
  • [2016] – Got 2nd prize in paper presentation event in SRUJAN 2016 at VSSUT, Burla
  • [2013] – Got highest attendance prize in 6th semester of B.Tech
  • [2007]- Passed the exam in NCC in school level in grade ‘A’
Memberships
  • IEEE Student Member (Id No. 95565715)
Publications
  • Tomato Leaf Disease Detection Using Deep Learning and Machine Learning

    Chebrolu M., Garikapati K., Veeramachaneni Y., Annabathina J., Mishra S.K., Mishra S.K.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    Detecting diseases in tomato leaves at an early stage is crucial for preventing crop damage and improving food security. Traditional diagnostic methods are often inefficient, requiring significant expertise and time. To address this challenge, we explore AI-driven approaches, integrating DL and ML methods for automated disease detection. This study employs CNNs, specifically leveraging the VGG16 architecture for feature extraction. Additionally, we compare its effectiveness with classical classifiers such as KNN and SVM. Using a publicly available dataset of healthy and diseased tomato leaves, our results indicate that CNN-based models outperform conventional machine learning classifiers in both accuracy and efficiency. Moreover, integrating IoT-based analytics enhances early detection, reducing crop losses and promoting sustainable agricultural practices.
  • Enhancing Heart Disease Prediction with Data Augmentation and ML Classifiers

    Rachapalli V.K., Meenavalli C., Nunna S.P., Yarramaneni P., Mishra S.K., Mishra S.K.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    Heart disease is a significant cause of death worldwide, and early prediction is vital for prevention and treatment. This project uses the Framingham Heart Study dataset for the early prediction of Coronary Heart Disease (CHD) using machine learning methods. The Framingham Heart Study is a highly unbalanced dataset, with only 16 % cases of CHD, which impacts the accuracy of the model. To overcome this, data augmentation techniques such as SMOTE and cGAN are applied to create synthetic cases of CHD. The machine learning algorithms that are compared: Random Forest, XGBoost, SVM, and MLP. XGBoost has achieved the highest AUC-ROC of 0.973 when cGAN-augmented data is used, while cGAN-augmented data improves recall and overall model performance significantly. This study identifies the potential for combining machine learning with data augmentation to improve CHD prediction.
  • Trading Strategy with EMA’s and Risk Management

    Pranav Somisetty S.D., Jagadishwar Gatte S., Kosuri N.B., Gowrish Chinta L., Mishra S.K., Kumar Mishra S.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    The trading world often appears mysterious, filled with stories of fear, hope, addiction, and occasional profits. However, many fail to recognize that consistent profitability in trading is driven by discipline, a well-defined strategy, and strict adherence to rules. This lack of awareness is a key reason why 75-90% of new traders enter the market with high expectations but end up losing their hard-earned money. In this research we propose a quantitative trading strategy based on exponential moving average (EMA) crossovers, volume analysis, and structured profit booking. The strategy utilises a short-term 9-period EMA and along-term 15-period EMA to identify trend reversals, generating buy signals when the two different EMA's crosses under some conditions and sell signals are generated when the opposite occurs. Meanwhile, a confirmation mechanism is introduced, requiring the price to move at least 0.06% above the crossover price while ensuring the crossover candle remains bullish. Additionally, volume conditions are incorporated to validate momentum, ensuring buy signals are triggered only when the trading volume increases in ascending order. To optimize trade management, a multi-tier profit booking system is implemented, allowing partial exits at predefined levels. which ensures that the traders secure gains while allowing profitable trades to run. The strategy's performance is evaluated through historical back-testing, assessing profitability, accuracy, and risk-reward dynamics. The results demonstrate the effectiveness of integrating EMA crossings with volumes and structured exit points in improving trade success rates. This might become the future of so many people to convert their portfolio from a losing streak to a winning streak.
  • Application of blockchain for secured edge computing system

    Dash A., Sahoo S.K., Mishra S.K., Mishra S.K.

    Book chapter, Cybersecurity Defensive Walls in Edge Computing, 2025, DOI Link

    View abstract ⏷

    Edge computing has become a game-changing technology in both academics and industry as the need for quicker and more effective data processing increases. Edge computing lowers latency and improves real-time analysis by processing and storing data close to its source. The increasing significance of edge computing in the current Information Technology architecture demands the critical need to secure its distributed nature. The integration of blockchain-based technologies with edge computing will be addressed in this chapter. Blockchain and edge computing integration can improve security. At the network edge, blockchain technology guarantees data integrity, authentication, and confidentiality. Secure access control mechanisms for distributed resources are made possible by this integration. It reduces the possibility of single points of failure or concentrated attacks or malicious attacks. Furthermore, it makes tamper-proof transactions possible by utilizing widespread acceptance technique like smart contracts. This technology is used as a strategic approach to improve edge computing systems' security architecture. Key security concerns including data integrity, privacy, and access management are addressed by blockchain. This is known for its decentralization, cryptographic integrity, and elimination of middlemen. These issues are made worse by the distributed nature of edge computing. This analysis, which is based on a thorough examination of the literature, emphasizes how blockchain technology may be used in edge contexts to enforce data protection, guarantee transparency, and provide trustworthy audit trails.
Contact Details

sugyankumar.m@srmap.edu.in

Scholars
Interests
Education
2014
B.Tech
Biju Patnaik University of Technology Rourkela, Odisha
India
2016
M.Tech
Veer Surendra Sai University of Technology Burla Sambalpur Odisha
India
2024
National Institute of Technology Durgapur, Durgapur, West Bengal
India
Experience
  • 2016-2018 – Assistant Professor – C.V. Raman Global University, Bhubaneswar, Odisha
Research Interests
  • Software Architecture
  • Service-Oriented Architecture
  • Service Composition
  • Healthcare
Awards & Fellowships
  • [2018-2023] – Institute Fellowship – Ministry of Education
  • [2016] – Got 2nd prize in paper presentation event in SRUJAN 2016 at VSSUT, Burla
  • [2013] – Got highest attendance prize in 6th semester of B.Tech
  • [2007]- Passed the exam in NCC in school level in grade ‘A’
Memberships
  • IEEE Student Member (Id No. 95565715)
Publications
  • Tomato Leaf Disease Detection Using Deep Learning and Machine Learning

    Chebrolu M., Garikapati K., Veeramachaneni Y., Annabathina J., Mishra S.K., Mishra S.K.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    Detecting diseases in tomato leaves at an early stage is crucial for preventing crop damage and improving food security. Traditional diagnostic methods are often inefficient, requiring significant expertise and time. To address this challenge, we explore AI-driven approaches, integrating DL and ML methods for automated disease detection. This study employs CNNs, specifically leveraging the VGG16 architecture for feature extraction. Additionally, we compare its effectiveness with classical classifiers such as KNN and SVM. Using a publicly available dataset of healthy and diseased tomato leaves, our results indicate that CNN-based models outperform conventional machine learning classifiers in both accuracy and efficiency. Moreover, integrating IoT-based analytics enhances early detection, reducing crop losses and promoting sustainable agricultural practices.
  • Enhancing Heart Disease Prediction with Data Augmentation and ML Classifiers

    Rachapalli V.K., Meenavalli C., Nunna S.P., Yarramaneni P., Mishra S.K., Mishra S.K.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    Heart disease is a significant cause of death worldwide, and early prediction is vital for prevention and treatment. This project uses the Framingham Heart Study dataset for the early prediction of Coronary Heart Disease (CHD) using machine learning methods. The Framingham Heart Study is a highly unbalanced dataset, with only 16 % cases of CHD, which impacts the accuracy of the model. To overcome this, data augmentation techniques such as SMOTE and cGAN are applied to create synthetic cases of CHD. The machine learning algorithms that are compared: Random Forest, XGBoost, SVM, and MLP. XGBoost has achieved the highest AUC-ROC of 0.973 when cGAN-augmented data is used, while cGAN-augmented data improves recall and overall model performance significantly. This study identifies the potential for combining machine learning with data augmentation to improve CHD prediction.
  • Trading Strategy with EMA’s and Risk Management

    Pranav Somisetty S.D., Jagadishwar Gatte S., Kosuri N.B., Gowrish Chinta L., Mishra S.K., Kumar Mishra S.

    Conference paper, 2025 International Conference on Artificial Intelligence and Machine Vision, AIMV 2025, 2025, DOI Link

    View abstract ⏷

    The trading world often appears mysterious, filled with stories of fear, hope, addiction, and occasional profits. However, many fail to recognize that consistent profitability in trading is driven by discipline, a well-defined strategy, and strict adherence to rules. This lack of awareness is a key reason why 75-90% of new traders enter the market with high expectations but end up losing their hard-earned money. In this research we propose a quantitative trading strategy based on exponential moving average (EMA) crossovers, volume analysis, and structured profit booking. The strategy utilises a short-term 9-period EMA and along-term 15-period EMA to identify trend reversals, generating buy signals when the two different EMA's crosses under some conditions and sell signals are generated when the opposite occurs. Meanwhile, a confirmation mechanism is introduced, requiring the price to move at least 0.06% above the crossover price while ensuring the crossover candle remains bullish. Additionally, volume conditions are incorporated to validate momentum, ensuring buy signals are triggered only when the trading volume increases in ascending order. To optimize trade management, a multi-tier profit booking system is implemented, allowing partial exits at predefined levels. which ensures that the traders secure gains while allowing profitable trades to run. The strategy's performance is evaluated through historical back-testing, assessing profitability, accuracy, and risk-reward dynamics. The results demonstrate the effectiveness of integrating EMA crossings with volumes and structured exit points in improving trade success rates. This might become the future of so many people to convert their portfolio from a losing streak to a winning streak.
  • Application of blockchain for secured edge computing system

    Dash A., Sahoo S.K., Mishra S.K., Mishra S.K.

    Book chapter, Cybersecurity Defensive Walls in Edge Computing, 2025, DOI Link

    View abstract ⏷

    Edge computing has become a game-changing technology in both academics and industry as the need for quicker and more effective data processing increases. Edge computing lowers latency and improves real-time analysis by processing and storing data close to its source. The increasing significance of edge computing in the current Information Technology architecture demands the critical need to secure its distributed nature. The integration of blockchain-based technologies with edge computing will be addressed in this chapter. Blockchain and edge computing integration can improve security. At the network edge, blockchain technology guarantees data integrity, authentication, and confidentiality. Secure access control mechanisms for distributed resources are made possible by this integration. It reduces the possibility of single points of failure or concentrated attacks or malicious attacks. Furthermore, it makes tamper-proof transactions possible by utilizing widespread acceptance technique like smart contracts. This technology is used as a strategic approach to improve edge computing systems' security architecture. Key security concerns including data integrity, privacy, and access management are addressed by blockchain. This is known for its decentralization, cryptographic integrity, and elimination of middlemen. These issues are made worse by the distributed nature of edge computing. This analysis, which is based on a thorough examination of the literature, emphasizes how blockchain technology may be used in edge contexts to enforce data protection, guarantee transparency, and provide trustworthy audit trails.
Contact Details

sugyankumar.m@srmap.edu.in

Scholars