Archive Issue – Vol.5, Issue.4 (Oct-Dec 2025)

Archive Issue – Vol.5, Issue.4 (October-December 2025)


DDQN-Based Adaptive Lightweight Honeypot Framework for Intelligent Cyber Threat Detection in Small and Medium Enterprises

Arshit Rawat, Devansh Namdev, Aditya Sharma, Anant Pratap Singh Sachan and Shivank Kumar Soni

Research Paper | Journal Paper

Vol.5, Issue.4, pp.1-07, Dec-2025

DOI: 10.5281/zenodo.17802728

Abstract

Honeypots serve as deceptive cybersecurity systems that attract and engage attackers, providing valuable insights into their methods within controlled environments. However, traditional honeypots are largely static and passive, making them easily identifiable and ineffective against modern, adaptive cyber threats. Existing adaptive models offer incremental improvements but remain limited by predefined rules or simplified learning mechanisms, restricting their responsiveness to complex and evolving attacks. This paper introduces an RL-Enhanced Adaptive Honeypot that integrates a Dueling Double Deep Q-Network (DDQN)-based decision engine to enable autonomous behavioural adaptation. The system dynamically adjusts its defence posture by analysing attacker activity and environmental metrics represented in a structured state model. Through continuous learning and policy optimization, the honeypot transitions between observation, deception, and mitigation strategies, maintaining an average accuracy of approximately 96% across behavioural prediction and threat intelligence classification tasks. Future work aims to employ simulated multi-stage attack environments to pre-train reinforcement learning agents, fostering the development of self-evolving honeypots capable of real-time, intelligent cyber defence.

Key-Words / Index Term: Adaptive Cyber Defence, DDQN, Honeypot, Network Security, Reinforcement Learning.

References

      1. A. Alahmari and B. Duncan, "Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence," 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 2020, pp. 1-5, 10.1109/CyberSA49311.2020.9139638
      2. Z. Aradi and A. Bánáti, "The Role of Honeypots in Modern Cybersecurity Strategies," 2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI), Stará Lesná, Slovakia, 2025, pp. 000189-000196, 10.1109/SAMI63904.2025.10883300
      3. T. T. Nguyen and V. J. Reddi, "Deep Reinforcement Learning for Cyber Security," in IEEE Transactions on Neural Networks and Learning Systems, vol. 34, no. 8, pp. 3779-3795, Aug. 2023, 10.1109/TNNLS.2021.3121870.
      4. Van Hasselt, Hado, Arthur Guez, and David Silver. "Deep reinforcement learning with double q-learning." Proceedings of the AAAI conference on artificial intelligence. Vol. 30. No. 1. 2016. https://doi.org/10.1609/aaai.v30i1.10295
      5. P. Holgado, V. A. Villagrá and L. Vázquez, "Real-Time Multistep Attack Prediction Based on Hidden Markov Models," in IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 1, pp. 134-147, 1 Jan.-Feb. 2020, 10.1109/TDSC.2017.2751478.
      6. Pashaei, Abbasgholi, et al. "Early Intrusion Detection System using honeypot for industrial control networks." Results in Engineering 16 (2022): 100576. https://doi.org/10.1016/j.rineng.2022.100576
      7. B. Hu and J. Li, "Shifting Deep Reinforcement Learning Algorithm Toward Training Directly in Transient Real-World Environment: A Case Study in Powertrain Control," in IEEE Transactions on Industrial Informatics, vol. 17, no. 12, pp. 8198-8206, Dec. 2021, 10.1109/TII.2021.3063489.
      8. Caminero, Guillermo, Manuel Lopez-Martin, and Belen Carro. "Adversarial environment reinforcement learning algorithm for intrusion detection." Computer Networks 159 (2019): 96-109. https://doi.org/10.1016/j.comnet.2019.05.013
      9. Y. Liu, H. Wang, M. Peng, J. Guan, J. Xu and Y. Wang, "DeePGA: A Privacy-Preserving Data Aggregation Game in Crowdsensing via Deep Reinforcement Learning," in IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4113-4127, May 2020, 10.1109/JIOT.2019.2957400
      10. Q. Xu, Z. Su and R. Lu, "Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3415-3429, 2020, 10.1109/TIFS.2020.2980823.
      11. Sethi, K., Sai Rupesh, E., Kumar, R. et al. A context-aware robust intrusion detection system: a reinforcement learning-based approach. Int. J. Inf. Secur. 19, 657–678 (2020). https://doi.org/10.1007/s10207-019-00482-7
      12. S. Otoum, B. Kantarci and H. Mouftah, "Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-7, 10.1109/ICC.2019.8761575
      13. Pacheco, Yulexis, and Weiqing Sun. "Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets." ICISSP.2021. https://www.scitepress.org/PublishedPapers/2021/102535/102535.pdf
      14. E. Suwannalai and C. Polprasert, "Network Intrusion Detection Systems Using Adversarial Reinforcement Learning with Deep Q-network," 2020 18th International Conference on ICT and Knowledge Engineering (ICT&KE), Bangkok, Thailand, 2020, pp. 1-7, 10.1109/ICTKE50349.2020.9289884
      15. Veluchamy, Selvakumar, and Ruba Soundar Kathavarayan. "Deep reinforcement learning for building honeypots against runtime DoS attack." International Journal of Intelligent Systems 37.7 (2022): 3981-4007. https://doi.org/10.1002/int.22708

Citation

Arshit Rawat, Devansh Namdev, Aditya Sharma, Anant Pratap Singh Sachan and Shivank Kumar Soni, "DDQN-BASED ADAPTIVE LIGHTWEIGHT HONEYPOT FRAMEWORK FOR INTELLIGENT CYBER THREAT DETECTION IN SMALL AND MEDIUM ENTERPRISES" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.4, pp.1-07, 2025. DOI: 10.5281/zenodo.17802728

An Optimized DeepFace Architecture for Real-Time Pedagogical Staff Surveillance and Movement Pattern Analysis in Heterogeneous Camera Topologies

Nikhil Kushwaha, Mayur Bansal, Pradyumna Tripathi and Shivank Kumar Soni

Research Paper | Journal Paper

Vol.5, Issue.4, pp.08-14, Dec-2025

DOI: 10.5281/zenodo.17862281

Abstract

To keep the workplace safe, accountable, and running smoothly, it's important to verify staff presence and follow their movements in a dynamic environment and changing conditions. However, traditional attendance and surveillance systems—often rely on manual validation or RFID-based tracking remain static, error-prone, and incapable of adapting to heterogeneous camera networks or various environmental conditions. Preexisting computer vision approaches offer limited scalability and struggle with real-time multi-camera synchronization which reduces accuracy and responsiveness in critical applications. This paper introduces a smart staff monitoring system that uses Optimized DeepFace–OpenCV–based surveillance framework that autonomously detects, verifies, and records staff presence across distributed IP camera feeds. The proposed system integrates facial embedding extraction, automated timetable mapping, and absence alert system to notify supervisors when assigned personnel are not detected within a set-time duration. A dual-interface Flask-based portal offers separate access modes for employees and supervisors, enabling attendance history, and absence alerts, live location visibility without compromising the privacy of the staff. Tests with different camera setups showed that the system is highly reliable, correctly recognizing faces nearly 97.8% (using SQLite) with a mean response latency of 1.3 seconds per frame even with changing lighting or movement scenarios. Looking forward, the farmwork aims to expand in the future toward edge-enabled analytics and IoT-integrated workforce management, fostering scalable deployment across educational, corporate, and industrial domains.

Key-Words / Index Term: DeepFace, OpenCV, Real-Time Surveillance, Staff Monitoring, Facial Recognition, Smart Automation, IP Camera Networks.

References

      1. Y. Taigman, M. Yang, M. Ranzato and L. Wolf, "DeepFace: Closing the Gap to Human-Level Performance in Face Verification," 2014 IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 2014, pp. 1701-1708, doi: 10.1109/CVPR.2014.220.
      2. F. Schroff, D. Kalenichenko and J. Philbin, "FaceNet: A unified embedding for face recognition and clustering," 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, 2015, pp. 815-823, doi: 10.1109/CVPR.2015.7298682.
      3. Dakhil, Nasreen & Abdulazeez, Adnan. (2024). Face Recognition Based on Deep Learning: A Comprehensive Review. Indonesian Journal of Computer Science. 13. DOI:10.33022/ijcs.v13i3.4037.
      4. G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, “Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments,” Univ. Massachusetts, Amherst, Tech. Rep. 07-49, 2007. DOI: 10.48550/arXiv.1708.08197
      5. M. Sandler, A. Howard, M. Zhu, A. Zhmoginov and L.-C. Chen, "MobileNetV2: Inverted Residuals and Linear Bottlenecks," 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 2018, pp. 4510-4520, doi: 10.1109/CVPR.2018.00474.
      6. P. Viola and M. Jones, "Rapid object detection using a boosted cascade of simple features," Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, Kauai, HI, USA, 2001, pp. I-I, doi: 10.1109/CVPR.2001.990517.
      7. Z. Cao, G. Hidalgo, T. Simon, S.-E. Wei and Y. Sheikh, "OpenPose: Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, no. 1, pp. 172-186, Jan. 2021, doi: 10.1109/TPAMI.2019.2929257.
      8. OpenCV Documentation, “VideoCapture and Real-Time Processing,” Available: https://docs.opencv.org/. [Accessed: Jan. 2025].
      9. S. Wang et al., “Multi-Camera Person Tracking via Deep Feature Fusion and Spatio-Temporal Consistency,” IEEE Access, vol. 8, pp. 12489–12500, 2020.
      10. A. Hermans, L. Beyer, and B. Leibe, “In Defense of the Triplet Loss for Person Re-Identification,” arXiv:1703.07737, 2017. DOI: https://doi.org/10.48550/arXiv.1703.07737
      11. M. L. Tran and T. T. Nguyen, “A Real-Time Face Recognition Attendance System Using Deep Learning,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 9, 2020.
      12. A. Khan, R. Ahmad, and S. Islam, “Smart Surveillance Systems Using Deep Learning Techniques: A Survey,” IEEE Access, vol. 9, pp. 17307–17337, 2021.
      13. J. Redmon and A. Farhadi, “YOLOv3: An Incremental Improvement,” arXiv:1804.02767, 2018. DOI: https://doi.org/10.48550/arXiv.1804.02767
      14. A. Dosovitskiy et al., “An Image is Worth 16×16 Words: Transformers for Image Recognition at Scale,” Proc. ICLR, 2021.
      15. Flask Documentation, “Flask — Lightweight WSGI Web Application Framework,” Available: https://flask.palletsprojects.com/. [Accessed: Jan. 2025].
      16. SQLite Documentation, “SQLite Features and Architecture,” Available: https://www.sqlite.org/. [Accessed: Jan. 2025].
      17. A. R. Chowdhury, H. J. Choi, and J. Shin, “Real-Time Multi-Camera Face Recognition in Smart Buildings,” IEEE Sensors Journal, vol. 20, no. 18, pp. 10856–10865, 2020.
      18. S. Minaee et al., “Deep-COVID: Predicting Community Mobility and Public Movement Trends,” IEEE Transactions on Neural Networks and Learning Systems, 2021.
      19. A. Ruiz, O. Revaud, J. Verbeek, and H. Jégou, “Learning Compact Face Representations for Identity Recognition,” Proc. IEEE CVPR, 2017.
      20. C. Szegedy et al., “Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning,” Proc. AAAI, 2017. DOI: https://doi.org/10.1609/aaai.v31i1.11231
      21. Halder, R., Chatterjee, R., Sanyal, D.K., Mallick, P.K. (2020). Deep Learning-Based Smart Attendance Monitoring System. In: Mandal, J., Mukhopadhyay, S. (eds) Proceedings of the Global AI Congress 2019. Advances in Intelligent Systems and Computing, vol 1112. Springer, Singapore. https://doi.org/10.1007/978-981-15-2188-1_9
      22. J.K. Aggarwal and M.S. Ryoo. 2011. Human activity analysis: A review. ACM Comput. Surv. 43, 3, Article 16 (April 2011), 43 pages. https://doi.org/10.1145/1922649.1922653

Citation

Nikhil Kushwaha, Mayur Bansal, Pradyumna Tripathi and Shivank Kumar Soni, "An Optimized DeepFace Architecture for Real-Time Pedagogical Staff Surveillance and Movement Pattern Analysis in Heterogeneous Camera Topologies" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.4, pp.08-14, 2025. DOI: 10.5281/zenodo.17862281

YOLOv8-FaceEmbedding: Real Time Missing Person Detection and Recognition

Priyanshu Singh, Riya Bisen, Prakhar Bisen, Riya Kaushik, Vinita Shivastava

Research Paper | Journal Paper

Vol.5, Issue.4, pp.15-21, Dec-2025

DOI: 10.5281/zenodo.18086738

Abstract

Every year, individuals go missing or remain unidentified due to accidents, displacement, or incident. Even though artificial intelligence and computer vision technology has come a long way to enhance surveillance systems, they are still constrained by the traditional single- camera and monolithic design when it comes to scalability and real time performance. This paper proposes a modular multi-camera face recognition surveillance system that uses a face-recognition library used for encoding and identifying faces along with YOLOv8 for object detection. The design separates camera management from the various recognition tasks and backend services for secure data management with encryption and role-based access management. The experiments demonstrated 95.3% accuracy for recognition, an average latency of 0.78 seconds, and an increase of 20% in efficiency and scalability compared to conventional systems. In conclusion, modern surveillance systems and applications provide a reliable, scalable and secure architecture. As a future improvement, our system utilizes AI-based facial de-aging and age-progression technology. The system can mimic the probable current facial structure of the individual by generating age-progressed images, resulting in more accurate matching between the newly lost or live-captured faces.

Key-Words / Index Term: Face Recognition, YOLOv8, Deep Learning, Facial Encoding, Multi-camera Surveillance, Missing Per- son Identification.

References

      1. B. Vinavatani, M. R. Panna, P. H. Singha and G. J. W. Kathrine, “AI for Detection of Missing Person,” International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 2022, pp. 66–73.
      2. S. Ayyappan and S. Matilda, “Criminals and Missing Children Identification Using Face Recognition and Web Scraping,” 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), pp. 1–5.
      3. N. Ahirrao, S. Jade, S. Jagtap, N. Ghuse, M. Ghonge and A. Potgantwar, “A Review on Identification of Missing Persons and Criminals using Image Processing,” International Journal of Creative Research Thoughts (IJCRT), vol. 10, no. 7, July 2022.
      4. A. Ponmalar et al., “Finding Missing Person Using Artificial Intelligence,” 2022 International Conference on Computer, Power and Communications (ICCPC), Chennai, India, 2022, pp. 562–565.
      5. B. Pathak et al., “Implementation of Website for Identification of Missing and Unrecognized People Using an Optimized Face Recognition Algorithm,” Pune, India, 2024.
      6. V. Shelke et al., “Searchious: Locating Missing People Using an Optimized Face Recognition Algorithm,” Fifth International Conference on Computing Methodologies and Communication (ICCMC 2021), Vasai, India, 2021.
      7. D. Mahadik et al., “Finding Missing Person Using AI,” International Journal of Advances in Engineering and Management (IJAEM), vol. 5, no. 4, pp. 1084–1088, April 2023.
      8. M. K. Singh et al., “Implementation of Machine Learning and KNN Algorithm for Finding Missing Person,” 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 1879–1883.
      9. M. Turk and A. Pentland, “Face Recognition Using Eigenfaces,” IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Maui, USA, 1991, pp. 586–591.
      10. R. Grover et al., “Facial Recognition/Comparison for Finding Missing Person Using Python and AWS,” IJSREM, vol. 10, no. 5, May 2022.
      11. N. Gholape et al., “Finding Missing Person Using ML, AI,” International Research Journal of Modernization in Engineering Technology and Science, vol. 3, no. 4, pp. 1517–1522, 2021.
      12. K. Suchana et al., “Development of User-Friendly Web-Based Lost and Found System,” Journal of Software Engineering and Applications, vol. 14, pp. 575–590, 2021.

Citation

Priyanshu Singh, Riya Bisen, Prakhar Bisen, Riya Kaushik, Vinita Shivastava, "YOLOv8-FaceEmbedding: Real Time Missing Person Detection and Recognition" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.4, pp.15-21, 2025. DOI: 10.5281/zenodo.18086738

HERBLEDGER: A HYPERLEDGER-based BLOCKCHAIN framework for Ayurvedic Herb Quality, Traceability, and Consumer Transparency

Anshika Tiwari, Aditi Vishwakarma, Akshita Bhatia, Imran Ali Khan

Research Paper | Journal Paper

Vol.5, Issue.4, pp.22-27, Dec-2025

DOI: 10.5281/zenodo.18100297

Abstract

Ayurvedic practice uses a wide range of herbs used in traditional medicine for centuries. However, the supply chain of Ayurvedic herbs is plagued by adulteration, lack of documentation, and quality evaluation inconsistency. This results in unfair pricing to farmers and low confidence to consumers. Existing systems use paper-based tracking and centralized databases that do not provide verifiable traceability and are susceptible to manipulation. To resolve these issues, we propose HERBLEDGER, a Hyperledger-based blockchain framework with smart contracts for automatic quality checks, GSTIN-based authentication, QR-traceable with SMS data flow for low-connectivity areas by integrating it with on-chain and off-chain database. HERBLEDGER, powered by decentralized consensus and immutable event logging, exhibits measurable advantages over legacy systems: ~35% greater traceability completeness, ~40% reduced verification latency, and ~30% improved tamper-detection accuracy. This indicates that HERBLEDGER strengthens regulatory oversight through transparent, tamper-proof provenance to ensure fair value distribution based on A/B/C quality grades while improving consumer trust.

Key-Words / Index Term: Blockchain, Hyperledger, Ayurvedic herbs, traceability, GSTIN authentication, smart contracts, quality grading.

References

      1. Mavis Hong-Yu Yik, Vivian Chi-Woon Taam Wong, Tin-Hang Wong, Pang-Chui Shaw, HerBChain, a blockchain-based informative platform for quality assurance and quality control of herbal products.
      2. Patelli, N. and Mandrioli, M. (2020), Blockchain technology and traceability in the agrifood industry.
      3. Y. Yang, “A blockchain and IPFS-based system for monitoring the geographical authenticity of herbs.”
      4. M. Zichichi, L. Serena, S. Ferretti and G. D’Angelo, "Towards Decentralized Complex Queries over Distributed Ledgers: a Data Marketplace Use-case."
      5. K. Chin and H. Lee, "Analysis of the Vulnerabilities of the Supply Chain Network of a Manufacturing Company using the Network-Science Approach: S-Electronics Case."
      6. S. Agrawal and R. Patel, “Blockchain-Enabled Framework for Herbal Supply Chain Transparency.”
      7. European Medicines Verification Organization (EMVO), “European Medicines Verification System (EMVS): securing the legal supply chain from falsified medicines,” 2025.
      8. U.S. Department of Health & Human Services, “Blockchain for Healthcare.”
      9. M. Han, “Blockchain technology in herbal medicines: Applications, challenges and future perspectives.”
      10. K. Vayadande, “Identification of Ayurvedic Medicinal Plant Using Deep Learning.”
      11. Z. Dong, "Application Analysis of Computer Technology in Cross-Border E-Commerce Environment."
      12. Zichichi M, Ferretti S, Rodríguez-Doncel V. Decentralized Personal Data Marketplaces: How Participation in a DAO Can Support the Production of Citizen-Generated Data.
      13. C. Schroeder, C. Steinmetz and R. Nagel Rodrigues, “Wireless Control for Smart Manufacturing: Recent Approaches and Open Challenges.”
      14. Patel, A., Sai, S., Daiya, A. et al. Blockchain enabled traceability in the jewel supply chain.
      15. S. Imran, T. Mahmood, A. Morshed and T. Sellis, "Big data analytics in healthcare − A systematic literature review and roadmap for practical implementation."
      16. K. Wnuk, "Involving Relevant Stakeholders into the Decision Process about Software Components."
      17. Muhammad A. Imran, Sajjad Hussain, Qammer H. Abbasi, "Cost Efficiency Optimization for Industrial Automation."
      18. Orozco-Santos, V. Sempere-Payá, J. Silvestre-Blanes and J. Vera-Pérez, "Scalability Enhancement on Software Defined Industrial Wireless Sensor Networks Over TSCH."
      19. I. B. Jafar and I. Al-Anbagi, "RSM: A Real-time Security Monitoring Platform for IoT Networks."
      20. Saroj Kumar Rout. Medic ledger: Blockchain-Based Supply Chain Architecture for Ayurvedic Product Authentication and Compliance.
      21. G. N. Schroeder, C. Steinmetz, R. N. Rodrigues, R. V. B. Henriques, A. Rettberg and C. E. Pereira, "A Methodology for Digital Twin Modeling and Deployment for Industry 4.0."
      22. Marchese, A., Tomarchio, O. A Blockchain-Based System for Agri-Food Supply Chain Traceability Management.
      23. Jain, A., “Implementation of Blockchain Enabled Healthcare System using Hyperledger Fabric.”
      24. Shiyang Song, Jiadong Lu, Hanxu Zhao, Wennan Wang, Chiyu Shi, and Ruijie Luo. 2023. “Traceability of Product Supply Chain Based on Hyperledger Fabric.”
      25. Chen, C.L., “Hyperledger Fabric-Based Tea Supply Chain Production Traceability.”
      26. Hasan, A.S.M.T., “A peer-to-peer blockchain-based architecture for trusted supply chains (SSI + DKMS).”
      27. Wang Z, Wang L, Xiao F, Chen Q, Lu L, Hong J. “A Traditional Chinese Medicine Traceability System Based on Lightweight Blockchain.”
      28. Keo, R. et al., “A secure rubber supply chain management system based on Hyperledger Fabric, IPFS and IoT.”
      29. Lv, G., “Blockchain-Based Traceability for Agricultural Products.”

Citation

Anshika Tiwari, Aditi Vishwakarma, Akshita Bhatia, Imran Ali Khan, "HERBLEDGER: A HYPERLEDGER-based BLOCKCHAIN framework for Ayurvedic Herb Quality, Traceability, and Consumer Transparency" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.4, pp.22-27, 2025. DOI: 10.5281/zenodo.18100297

AYURSYNC AI:An Intelligent Health Manager using Decision Tree

Palak Rohra, Nikhil Kalawat, Harshita Patle, Kushagra Kumar Pathak, Sanjay Kumar Sharma

Research Paper | Journal Paper

Vol.5, Issue.4, pp.28-34, Dec-2025

DOI: 10.5281/zenodo.18135727

Abstract

AyurSync AI: It is an ayurvedic health management platform that combines the knowledge of ayurveda with the knowledge of allopathy. The platform follows a decision tree structure for symptom parsing, mapping them with possible Ayurvedic diseases using Ayurveda disease codes (Namaste Portal), as well as WHO ICD-10 codes. In contrast to present-day decision-support systems that focus on a particular system, AyurSync AI provides explanations for a disease and customized lifestyle advice such as dietary, exercise, and yogic guidance. Some of its features include multi-language symptom input, search for Ayurveda/other practitioners in your neighborhood (up to 10 km), and appointment booking. Future updates include machine learning predictions, support for more languages, telemedicine consultation, and linkage with the electronic health record system.

Key-Words / Index Term: Digital Health, Healthcare Information Systems, Ayurveda Integration, ICD Classification, Symptom Analysis, Natural Language Processing, Appointment Scheduling, Health Informatics, Location-Based Healthcare Services.

References

      1. R. Gupta and S. Mehta, “Structured Medical Information Retrieval Systems: A Review,” International Journal of Healthcare Informatics, vol. 12, no. 3, pp. 145–152, 2021.
      2. L. Sharma and A. Verma, “Natural Language Processing for Clinical Query Understanding,” Journal of Medical Data Science, vol. 9, no. 1, pp. 33–41, 2020.
      3. K. Patel and J. Rao, “Unified Digital Health Platforms: Challenges and Opportunities,” HealthTech Review, vol. 15, no. 2, pp. 78–86, 2022.
      4. D. Banerjee, “Location-Aware Healthcare Applications and Their Impact on Patient Accessibility,” Journal of Smart Health Systems, vol. 7, no. 4, pp. 201–209, 2021.
      5. P. Fernandes and T. Kaur, “Integrating Mapping Technologies in Digital Healthcare Systems,” International Journal of Medical Computing, vol. 14, no. 1, pp. 55–63, 2020.
      6. M. Roy and H. Daniel, “Bridging Navigation Gaps in Patient-Centered Health Applications,” Proceedings of the International Conference on e-Health Systems, pp. 112–118, 2021.
      7. Singh and V. Joshi, “Online Appointment Systems: Improving Scheduling Accuracy and Workflow Efficiency,” Journal of Healthcare Operations, vol. 11, no. 2, pp. 89–97, 2019.
      8. Ibrahim and R. Khanna, “Digital Documentation and Patient Record Management in Web-Based Health Tools,” International Journal of Medical Information Security, vol. 8, no. 3, pp. 142–150, 2020.
      9. J. Chen, K. Li, and H. Wang, “Artificial Intelligence–Based Clinical Decision Support Systems: A Review,” Journal of Biomedical Informatics, vol. 107, pp. 103–115, 2020.
      10. M. Kaur and P. Garg, “Design and Implementation of Web-Based Healthcare Management Systems,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 11, no. 6, pp. 412–419, 2020.
      11. World Health Organization, “International Classification of Diseases (ICD-11): Digital Use and Applications,” WHO Press, Geneva, 2019.
      12. P. S. Rani and M. V. Kumar, “Role-Based Access Control in Healthcare Information Systems,” International Journal of Information Security, vol. 13, no. 2, pp. 85–92, 2018.
      13. Nguyen, L., Lee, J. T., Hulse, E. S. G., Hoang, M. V., Kim, G. B., & Le, D. B. (2021). Health Service Utilization and Out of Pocket Expenditure Associated with the Continuum of Disability in Vietnam. International Journal of Environmental Research and Public Health, 18(11):5657. https://doi.org/10.3390/ijerph18115657

Citation

Palak Rohra, Nikhil Kalawat, Harshita Patle, Kushagra Kumar Pathak, Sanjay Kumar Sharma, "AYURSYNC AI:An Intelligent Health Manager using Decision Tree " International Journal of Scientific Research in Technology & Management, Vol.5, Issue.4, pp.28-34, 2025. DOI: 10.5281/zenodo.18135727