Designing Interpretable and Explainable AI Frameworks for Smallholder Agriculture

The world's food supply relies on individual with small holding farmers, but these farmers frequently lack access to sophisticated decision-support systems. The models are difficult to grasp, which is limiting the application of artificial intelligence (AI), despite its promise to increase output through prediction, disease detection, and input optimization. For smallholder farmers in particular, our proposed approach integrates interpretable approaches like decision trees and rule-based categorization with post-hoc explainability techniques like SHAP and LIME to generate explainable AI (XAI) models. Additionally, it develops user-friendly interfaces that enhance clarity through the use of visual, verbal, and contextual cues. Trust, usability, and decision-making assistance are assessed using field appraisals and participatory design approaches. Last but not least, the study establishes a link between AI effectiveness and its understandability, which empowers farmers via transparency and promotes long-term agricultural expansion.

  • Research Type: Laboratory Research
  • Paper Type: Experimental Research Paper
  • Vol.7 , Issue 6 , Pages: 26 - 32, Nov 2025
  • Published on: 05 Nov, 2025
  • Issue Type: Regular
  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

About Authors:
YEGIREDDI RAMESH
India
Aditya Institute of Technology and Management

Dr. Yegireddi Ramesh has been working as Professor & HOD in the Department of CSE at Aditya Institute of Technology and Management (A), Tekkali, Srikakulam permanently affiliated with Jawaharlal Nehru Technological University Vizianagaram, Andhra Pradesh, India. He completed his Bachelor of Science (B.Sc) from Andhra University. He completed a Master of Computer Applications (MCA) from Osmania University, Master of Technology (M.Tech - CSE) from JNTUH Hyderabad and Ph D (CSE) from JNTUK Kakinada. He filed one International Patent, was published WIPO PCT, and also filed 3 Indian Patents (including 1 - Design), among them one granted and other are published in Indian Patent Journal, Govt. of India. He secured one Copyright which was granted by the Copyright Office, Government of India. He also wrote three Textbooks entitled A Methodical Observation of the Analysis of Cryptographic Algorithms, Integrating AI, Big Data, and Cyber Security for next generation Communication and Networking Systems, and Internet of Things. He published 30 Research papers in various reputed (UGC approved, Scopus/ SCI / Web of Science) International and National Journals, magazines, and conferences. He is also a reviewer for International Journal of Research and Development in Engineering Sciences (IJRDES-2582- 4201)). He has more than 24 years of experience in teaching and research and also has good knowledge of Information Security, Networks, Data Science, Blockchain and Internet of Things along with academic subjects, etc. He guided 35 UG and 20 PG academic projects. Currently, he is an active member of ISTE, CSI, and ACM.""""""


Copyright © 2025, This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC-BY-NY-SA). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Corresponding Author: YEGIREDDI RAMESH, rameshyegireddi@gmail.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Conflict of interest: The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Global Readers View
  • No. of Readers
    247
  • No. of Reaction
    0
  • No. of Comments
    0
  • No. of Downloads
    0

Or share your Opinion

Edited by:
  • Editor-In-Chief
    IJRDES
Reviewed by:
Similar Papers
Authors’ other publications
  • Drowsiness Detecting Syst...
    07 Jun, 2020

    Driver fatigue and drowsiness are major causes of road accidents worldwide, emphasizing the need for an efficient and...

  • Phishing URL Detection us...
    14 Jun, 2020

    Phishing is one of the most prevalent cyber threats, where attackers deceive users through fraudulent websites or URLs...

  • Predicting Botnet Attack...
    01 Nov, 2025

    As an extension of cloud services to the edge, Fog computing is a current paradigm for latency-sensitive and...

×