Research Guidance
Research Guidance Page
Doctoral Research Guidance
Appreciation is a wonderful thing. Our goal is to respond to the call of creating the emerging leaders of tomorrow
Master Degree Research Guidance
Laxminarayan Dash
2019
Title: Sensor-Based Data Acquisition for CVD System
Reg. No: 01479/2019
Roll No: 23COMP010
Chinmaya Kumar Panda
2023
Title: Designing Interface for Body Composition Analysis
Reg. No: 20277/2023
Roll No: 23COMP006
Beadprakasha Pattnaik
2020
Title: Explainable AI and Counterfactuals in CVD System
Reg. No: 14651/2020
Roll No: 23COMP002
Mandakini Parida
2023
Title: Model Development and Evaluation for CVD Prediction
Reg. No: 20282/2023
Roll No: 23COMP006
Ranjan Gouda
2017
Title: System Design of CVD Risk Prediction System
Reg. No: 09456/2017
Roll No: 23COMP019
Nilanchala Nahak
2023
Title: Database and Interface Design for CVD System
Reg. No: 21186/2023
Roll No: 23COMP014
Sritam Pradhan
2019
Title: Input Interface Designing of Online Examination System
Reg. No: 00540/2019
Roll No: 23COMP025
Binayak Sethy
2020
Title: Doctor Appointment Web APP
Reg. No: 20181/2020
Roll No: 23COMP005
Sudhir Bishoyi
2020
Title: Output Interface Designing of Examination System
Reg. No: 44753/2020
Roll No: 23COMP027
Binayak Dash
2020
Title: LingOLearn (Language Learning Web APP)
Reg. No: 06421/2020
Roll No: 23COMP004
Total Profiles: 45
Doctoral Awarded
-
Sisira Kumar Kapat —
“An Intelligent Spyware Detection System based on Association Mining”
Reg. No: 21/2016-17
Notification: 3530/EC-II (M.Phil./Ph.D.)/2022 dated 30/09/2022 -
Binayak Panda —
“Designing an Optimizing Strategy for Malware Analysis using Innovative Techniques from Data Mining”
Reg. No: 65/2015-16
Notification: 2994/EC-II (M.Phil./Ph.D.)/2022 dated 30/08/2022 -
Om Prakash Samantray —
“A Study to Develop a Knowledge Domain Analyzer using Data Mining Concepts for Malware Analysis”
Reg. No: 67/2015-16
Notification: 1669/EC-II (M.Phil./Ph.D.)/2022 dated 31/05/2022
Doctoral Ongoing
-
Diptimayee Sahu —
“Android Malware Detection using Deep Learning Approach”
Reg. No: 11/U-2019 -
Dibas Kumar Hembram —
“Stages of Heart Disease Prediction Applying Explainable Artificial Intelligence Techniques”
Reg. No: 41/U-2020 -
Pragnya Das —
“Hybrid Ensemble Deep Learning Approach for Detection of Cancer”
Reg. No: 43/U-2020 -
Lalit Kumar Behera —
“Enhancing Diagnostic Accuracy and Explainability in Medical Imaging with Deep Learning and XAI”
Reg. No: 20/U-2020
Masters
-
Laxminarayan Dash —
“Sensor-Based Data Acquisition for CVD System”
Reg. No: 01479/2019
Roll No: 23COMP010 -
Chinmaya Kumar Panda —
“Designing Interface for Body Composition Analysis”
Reg. No: 20277/2023
Roll No: 23COMP006 -
Beadprakasha Pattnaik —
“Explainable AI and Counterfactuals in CVD System”
Reg. No: 14651/2020
Roll No: 23COMP002 -
Mandakini Parida —
“Model Development and Evaluation for CVD Prediction”
Reg. No: 20282/2023
Roll No: 23COMP006 -
Ranjan Gouda —
“System Design of CVD Risk Prediction System”
Reg. No: 09456/2017
Roll No: 23COMP019 -
Nilanchala Nahak —
“Database and Interface Design for CVD System”
Reg. No: 21186/2023
Roll No: 23COMP014 -
Sritam Pradhan —
“Input Interface Designing of Online Examination System”
Reg. No: 00540/2019
Roll No: 23COMP025 -
Binayak Sethy —
“Doctor Appointment Web APP”
Reg. No: 20181/2020
Roll No: 23COMP005 -
Sudhir Bishoyi —
“Output Interface Designing of Examination System”
Reg. No: 44753/2020
Roll No: 23COMP027 -
Binayak Dash —
“LingOLearn (Language Learning Web APP)”
Reg. No: 06421/2020
Roll No: 23COMP004 -
Nayan Mahapatra —
“XX”
Reg. No: CC
Roll No: MTC116 - Ankita Sabata — “Android Malware Detection using Association Mining”
- Dipika Ratha — “Data mining methods to study malware behavior and their Specifications”
- Sapana Kumar Padhy — “Detection of malicious android application using permission Mapping”
- Sushree Smita Nanda — “A structural Analysis of android malware and its detection based on data mining approach”
- Sachin Kumar Patra — “Fine grained android malware detection using data mining”
- Mrutyunjaya Satapathy — “Applying data mining approach for threat analysis in android environment”
-
Sashmita Kumari Panda —
“A Study on Performace Evaluation of Classifiers in Malware Classification”
Reg. No: 52/2016 -
Alisha Padhy —
“A Study and Analysis of Malware Security Threats and Risks Anatomy”
Reg. No: 48/2016 -
Diptimayee Sahu —
“A Malware Detection model by EULA classification using Text Mining”
Roll No: MTC116 -
Manoswini Mohanty —
“An Adware Detection System using Classification Mining”
Reg. No: 30047/2015
Roll No: MTC316 -
Giribala Sahu —
“A Study and Analysis of Trojan Horse using Classification”
Reg. No: 49/2014
Roll No: MTC1015 -
M.Soujanya —
“A Study and Classification of Spyware using Detection Tree Analysis”
Reg. No: 51/2014
Roll No: MTC215 -
Sasmita Kumari Choudhury —
“A Comparative Study on Botnet using Classification Mining”
Reg. No: 70/1995
Roll No: MTC915 -
Debasish Pradhan —
“A Study and Classification of ROOTKITs Using Decision Tree Analysis”
Reg. No: 46/2014
Roll No: MTC315 -
Sisira Kumar Kapat —
“A Spyware Detection System with a Comparative Study of Spywares using Classification Rule Mining”
Reg. No: 47/2013
Roll No: MTC614 -
Shasanka Sekhar Panda —
“A Comparative Study and Performance Analysis of Adware Detection Technique using Classification Rule Mining”
Reg. No: 3552/2006
Roll No: MTC1214 -
Ramakrushna Dash —
“A Comparative Study of Worm Detection Techniques using Classification Rule Mining”
Reg. No: 45/2013
Roll No: MTC0114 -
Mamarani Sahu —
“A Key Logger Detection Architecture with Analysis of some classification algorithms using Key Logger data”
Reg. No: 42/2013
Roll No: MTC1514 -
Chaitanya Patnaik —
“A Study and Analysis on SQL Injection Attacking Process”
Reg. No: 6147/1982 -
Aratibala Sahu —
“A Comprehensive Study and Analysis on Browser Hijackers Attacking Process”
Reg. No: 2182/2012 -
Sugyani Panigrahi —
“A Study on Browser Hijackers Attacking Process”
Reg. No: 2194/2012 -
Jaya Panigrahi —
“A Comprehensive Study and Analysis on Phishing Attacking Process”
Reg. No: 128/2002 -
Gayatri Kumari Panda —
“A Study and Analysis on Exploit Attacking Process”
Reg. No: 2185/2012 -
Prasanta Kumar Panda —
“A Comprehensive Study and Analysis on Backdoor Attacking Process”
Reg. No: 2190/2012 -
Sreemayee Padhi —
“A Study and Analysis on Adware Attacking Process”
Reg. No: 2193/2012 -
Deeptimayee Dash —
“A Study on Machine learning approaches for Malware analysis”
Reg. No: 2184/2012 -
M. Biswajit —
“A Study on Trojan Attacking Process”
Reg. No: 2186/2012 -
M. Venkata Laxmi Srinivas —
“A Study and Analysis on Botnet Attacking Process”
Reg. No: 2187/2012 -
Ranjeeta Kumbhar —
“A Study and Analysis on Spyware Attacking Process for Malware Detection”
Reg. No: 2191/2012 -
Swagatika Kar —
“A Study on Data Mining approaches for Malware analysis”
Reg. No: 2195/2012 -
Uma Shankar Mohanty —
“An Exhaustive Study on Keylogger Attacking Process”
Reg. No: 2196/2012