AI-Enhanced High-Speed Data Encryption System for Unmanned Aerial Vehicles in Fire Detection Applications
DOI:
https://doi.org/10.18196/jrc.v6i4.26275Keywords:
Edge Encryption, FPGA, AES-256, UAV Sensing, Real-time AI, YOLOv8-TinyAbstract
Small unmanned aerial vehicles (UAVs) are increasingly used for wildfire detection, where they must not only identify fire events rapidly but also transmit large volumes of sensor data securely to ground stations. Achieving both fast on-board analysis and high-speed encrypted data transmission within the size, weight, and power limits of UAV platforms remain a major technical challenge. In this study, we introduce a compact, FPGA-based system that simultaneously performs real-time fire detection and high-throughput data encryption. Our system integrates a programmable logic chip (FPGA), deep-learning models for visual recognition, and AES-256 cryptographic cores onto a single hardware module. A key innovation is a shared scheduling mechanism that coordinates these two functions efficiently. Furthermore, we demonstrate how artificial intelligence contributes beyond image classification: a lightweight neural network monitors input data streams and dynamically adjusts encryption key parameters, thereby improving security without compromising performance. The hardware supports encrypted data transfer rates of 800 megabits per second at a latency of just 2 microseconds, while identifying fire signatures at 30 frames per second. Extensive testing, including cross-validation on a 50,000-frame dataset and environmental stress testing from –20 °C to 55 °C, confirms robust performance under real-world conditions. While the current memory footprint limits multi-camera input, this work offers a foundational design for future systems that aim to combine edge computing, secure communications, and AI-driven perception in autonomous aerial platforms.
References
R. Barrett-Gonzalez and N. Wolf, “High Speed Microactuators for Low Aspect Ratio High Speed Micro Aircraft Surfaces,” Actuators, vol. 10, no. 10, p. 265, Oct. 2021, doi: 10.3390/act10100265.
N. Gopinath and S. P. Shyry, “Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks,” Soft Computing, vol. 27, no. 18, pp. 13365–13372, Sep. 2022, doi: 10.1007/s00500-022-07479-w.
B. Li, Z. Yang, D. Chen, S. Liang, and H. Ma, “Maneuvering target tracking of UAV based on MN-DDPG and transfer learning,” Defence Technology, vol. 17, no. 2, pp. 457–466, Apr. 2021, doi: 10.1016/j.dt.2020.11.014.
Y. Wu, J. Gou, X. Hu, and Y. Huang, “A new consensus theory-based method for formation control and obstacle avoidance of UAVs,” Aerospace Science and Technology, vol. 107, p. 106332, Dec. 2020, doi: 10.1016/j.ast.2020.106332.
M. M. Alam, M. Y. Arafat, S. Moh, and J. Shen, “Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey,” Journal of Network and Computer Applications, vol. 207, p. 103495, Nov. 2022, doi: 10.1016/j.jnca.2022.103495.
S. M. Mantrashetti, A. P. Chavan, P. Pawar, H. V. R. Aradhya, and O. S. Powar, “A Novel Algorithm for Aspect Ratio Estimation in SRAM Design to Achieve High SNM, High Speed, and Low Leakage Power,” IEEE Access, vol. 13, pp. 9942–9954, 2025, doi: 10.1109/access.2025.3527333.
M. Bakyt, L. La Spada, N. Zeeshan, K. Moldamurat, and S. Atanov, “Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs,” Applied Sciences, vol. 15, no. 5, p. 2429, Feb. 2025, doi: 10.3390/app15052429.
M. Shirichian, R. Sabbaghi-Nadooshan, M. Houshmand, and M. Houshmand, “A QTCP/IP reference model for partially trusted-node-based quantum-key-distribution-secured optical networks,” Quantum Information Processing, vol. 23, no. 3, Mar. 2024, doi: 10.1007/s11128-024-04285-1.
F. Bayat, “Model Predictive Sliding Control for Finite-Time Three-Axis Spacecraft Attitude Tracking,” IEEE Transactions on Industrial Electronics, vol. 66, no. 10, pp. 7986–7996, Oct. 2019, doi: 10.1109/tie.2018.2881936.
K. M. Eisenhardt, “Building Theories from Case Study Research,” Academy of Management Review, vol. 14, no. 4, pp. 532–550, Oct. 2023, doi: 10.5465/amr.1989.4308385.
L. Dong, Y. Xie, C. Han, and S. Du, “Active fault‐tolerant control of multi‐unmanned aerial vehicle system with time‐varying topology,” Asian Journal of Control, vol. 27, no. 3, pp. 1335-1345, 2025, doi: 10.1002/asjc.3510.
N. Emer and N. S. Özbek, “Control of Attitude Dynamics of an Unmanned Aerial Vehicle with Reinforcement Learning Algorithms,” Avrupa Bilim Ve Teknoloji Dergisi, no. 29, pp. 351-357, Dec. 2021, doi: 10.31590/ejosat.1021970.
G. Joshi, “Advanced Control Techniques for Unmanned Aerial Vehicle (UAV) Navigation and Flight Control,” NeuroQuantology, vol. 20, no. 10, 2022, doi: 10.48047/nq.2022.20.10.nq551258.
K. Moldamurat, A. Tulembayeva, A. Ryspaev, N. Belgibekov, L. Peryakina, and M. Bakyt, “Computer program in sign language for controlling mobile objects and communicating with people,” International Journal of Public Health Science (IJPHS), vol. 14, no. 1, p. 502, Mar. 2025, doi: 10.11591/ijphs.v14i1.24544.
F. Candan, O. F. Dik, T. Kumbasar, M. Mahfouf, and L. Mihaylova, “Real-Time Interval Type-2 Fuzzy Control of an Unmanned Aerial Vehicle with Flexible Cable-Connected Payload,” Algorithms, vol. 16, no. 6, p. 273, May 2023, doi: 10.3390/a16060273.
N. Yıldıran, “Real-time verification of solar-powered forest fire detection system using ensemble learning,” Expert Systems with Applications, vol. 255, p. 124791, Dec. 2024, doi: 10.1016/j.eswa.2024.124791.
X. Zheng, “Advanced Solar-Powered Fire Detection System: A Wireless Sensor Node Approach to Early Warning and Forest Fire Prevention,” Highlights in Science, Engineering and Technology, vol. 62, pp. 90–95, Jul. 2023, doi: 10.54097/hset.v62i.10429.
Z. Chen, M. Zeng, and Z. Fei, “Joint Unmanned Aerial Vehicle Location and Beamforming and Caching Optimization for Cache-Enabled Multi-Unmanned-Aerial-Vehicle Networks,” Electronics, vol. 12, no. 16, p. 3438, Aug. 2023, doi: 10.3390/electronics12163438.
D. V. Apollonov, K. I. Bibikova, V. M. Shibaev, and I. E. Efimova, “Creation Of Algorithms For The Automatic Control System Of The Convertible Unmanned Aerial Vehicle,” Trudy MAI, no. 122, 2022, doi: 10.34759/trd-2022-122-23.
F. R. Hashim, “Decentralized 3D Collision Avoidance System for Unmanned Aerial Vehicle (UAV),” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, no. 7, pp. 446–460, Jul. 2020, doi: 10.5373/jardcs/v12i7/20202025.
E. Nejabat and A. Nikoofard, “Switching tube model predictive based controller design for multi‐agent unmanned aerial vehicle system with hybrid topology,” International Journal of Robust and Nonlinear Control, vol. 33, no. 17, pp. 10468–10492, Jul. 2023, doi: 10.1002/rnc.6871.
C. Liu, M. Wang, Q. Zeng, and W. Huangfu, “Leader-following flocking for unmanned aerial vehicle swarm with distributed topology control,” Science China Information Sciences, vol. 63, no. 4, Mar. 2020, doi: 10.1007/s11432-019-2763-5.
K. Moldamurat et al., “Improved unmanned aerial vehicle control for efficient obstacle detection and data protection,” IAES International Journal of Artificial Intelligence, vol. 13, no. 3, pp. 3576–3576, Jul. 2024, doi: 10.11591/ijai.v13.i3.pp3576-3587.
T. O. Olayinka, A. A. Olatide, A. D. Oluwagbemiga, and M. O. Okelola, “Internal model control tuned proportional integral derivative for quadrotor unmanned aerial vehicle dynamic model,” Control. Theory Inform.(IISTE), vol. 9, pp. 1-10, 2020, doi: 10.7176/cti/9-01.
W. Li, “Unmanned Aerial Vehicle (UAV) in Precision Agriculture to Identify the Crop Water Shortage by Using Multi-Spectral Sensor,” Open Access Journal of Agricultural Research, vol. 8, no. 2, pp. 1–4, 2023, doi: 10.23880/oajar-16000303.
N. T. Hegde, “Design of H-infinity Controller for VTOL Tiltrotor Unmanned Aerial Vehicle,” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, no. SP3, pp. 1061–1070, Feb. 2020, doi: 10.5373/jardcs/v12sp3/20201352.
S. Al Azzam, “The AI algorithm for text encryption using Steganography,” The œscholar journal for sciences & technology, vol. 1, no. 1, Jan. 2023, doi: 10.53348/nea4.
V. Katiyar and S. Mandloi, “Implementation of an Ai-Powered Surveillance System for Industrial Fire Detection with YOLO-V8,” International Journal of Progressive Research in Engineering Management and Science, vol. 4, no. 10, pp. 1324-1332, Nov. 2024, doi: 10.58257/ijprems36900.
K. Moldamurat, Y. Seitkulov, S. Atanov, M. Bakyt, and B. Yergaliyeva, “Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study,” International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering, vol. 14, no. 1, pp. 479–479, Feb. 2024, doi: 10.11591/ijece.v14i1.pp479-487.
Y. K. Cheng and J. J. Kim, “AI-powered Badminton Video Detection: Enhancing Gameplay Analysis and Training,” J Robot Auto Res, vol. 4, no. 2, pp. 392-402, 2023, doi: 10.33140/jrar.04.02.05.
G. Sabbani, “AI - Powered Financial Planning and Analysis (FP and A) Using Cloud Computing,” International Journal of Science and Research (IJSR), vol. 13, no. 7, pp. 362–365, Jul. 2024, doi: 10.21275/sr24705234246.
O. Reddy Polu, “AI-Powered Traffic Violation Detection Using CCTV Footage,” International Journal of Science and Research (IJSR), vol. 13, no. 3, pp. 1956–1961, Mar. 2024, doi: 10.21275/sr24038113847.
Y. Vanapalli and Praveen, “AI-Powered System for Early Stroke Detection Using ECGandPPG,” Journal of Engineering Sciences, vol. 15, no. 12, pp. 131–140, 2024, doi: 10.36893/jes.2024.v15i12.015.
D. K. Chaturvedi and M. C. Singh, “Fire Detection System and Spurious (False) Fire Warning Of the Aircraft - An Overview,” Journal of Aerospace Sciences and Technologies, pp. 336–343, Jul. 2023, doi: 10.61653/joast.v69i2.2019.208.
M. Bakyt, L. L. Spada, K. Moldamurat, Z. Kadirbek, and F. Yermekov, “Review of Data Security Methods using Low-Earth Orbiters for High-Speed Encryption,” 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS), pp. 1366–1375, Dec. 2024, doi: 10.1109/icuis64676.2024.10867245.
M. K. M. Hanif, “AI - Driven Transformation in Fire Safety: A Comprehensive Study on AI - Integrated Fire Alarm and Detection Systems,” International Journal of Science and Research (IJSR), vol. 12, no. 8, pp. 125–126, Aug. 2023, doi: 10.21275/sr23727132310.
V. Koibichuk, A. Samoilikova, and M. Habenko, “The effectiveness of employment in high-tech and science-intensive business areas as important indicator of socio-economic development: cross-country cluster analysis,” SocioEconomic Challenges, vol. 6, no. 4, pp. 106–115, 2022, doi: 10.21272/sec.6(4).106-115.2022.
O. Chernikova, N. Heitzmann, M. Stadler, D. Holzberger, T. Seidel, and F. Fischer, “Simulation-Based Learning in Higher Education: A Meta-Analysis,” Review of Educational Research, vol. 90, no. 4, pp. 499–541, Jun. 2020, doi: 10.3102/0034654320933544.
S. Gul and H. Yeo, “Correlation of High-Speed Tiltrotor Stability Predictions with Test Data and Parametric Study,” Journal of Aircraft, vol. 61, no. 4, pp. 1283–1292, Jul. 2024, doi: 10.2514/1.c037807.
Y. Fang, Y. Nie, and M. Penny, “Transmission dynamics of the COVID‐19 outbreak and effectiveness of government interventions: A data‐driven analysis,” Journal of Medical Virology, vol. 92, no. 6, pp. 645–659, Mar. 2020, doi: 10.1002/jmv.25750.
Z. Zhang and S. Lin, “Analysis of the Effectiveness and Countermeasures of High-Quality Economic Development in the Pearl River Delta City Cluster,” American Journal of Industrial and Business Management, vol. 12, no. 05, pp. 984–994, 2022, doi: 10.4236/ajibm.2022.125050.
M. Bakyt, K. Moldamurat, N. Belgibekov, A. Zhumabayeva, and A. Tilenbayev, “Development and Analysis of the Effectiveness of High-Speed Asymmetric Encryption Methods for Protecting Data from UAVs,” Lecture Notes in Networks and Systems, pp. 189–199, 2025, doi: 10.1007/978-981-97-9327-3_16.
M. Bakyt, K. Moldamurat, A. Konyrkhanova, A. Maidanov, and D. Z. Satybaldina, “Integration of Cryptography and Navigation Systems in Unmanned Military Mobile Robots: A Review of Current Trends and Perspectives,” DTESI (workshops, short papers), 2023.
P. Ermakov and A. Gogolev, “Comparative analysis of information integration architectures of strapdown inertial navigation systems for unmanned aerial vehicles,” Trudy MAI, no. 117, 2021, doi: 10.34759/trd-2021-117-11.
U. Papa, “Unmanned Aircraft Systems with Autonomous Navigation,” Electronics, vol. 12, no. 7, p. 1591, Mar. 2023, doi: 10.3390/electronics12071591.
H. A. Mwenegoha, T. Moore, J. Pinchin, and M. Jabbal, “Error characteristics of a model-based integration approach for fixed-wing unmanned aerial vehicles,” Journal of Navigation, vol. 74, no. 6, pp. 1353–1366, Nov. 2021, doi: 10.1017/s0373463321000424.
X. Du, M. Wang, W. Wu, P. Zhou, and J. Cui, “State transformation extended Kalman filter–based tightly coupled strapdown inertial navigation system/global navigation satellite system/laser Doppler velocimeter integration for seamless navigation of unmanned ground vehicle in urban areas,” International Journal of Advanced Robotic Systems, vol. 20, no. 2, Mar. 2023, doi: 10.1177/17298806231158462.
V. V. Kiryushkin, S. S. Tkachenko, and E. E. Stryapchev, “Methodology for technical diagnostics of navigation equipment for consumers of the global navigation satellite system of an unmanned aerial vehicle using a barometric altimeter,” Electromagnetic Waves and Electronic Systems, 2022, doi: 10.18127/j15604128-202201-07.
Y. Xu, C. Zhang, G. Wang, Z. Qin, and Q. Zeng, "A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services," in IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 3, pp. 1421-1432, 2021, doi: 10.1109/TETC.2020.3005610.
K. Moldamurat, M. Bakyt, D. Yergaliyev, D. Kalmanova, A. Galymzhan, and A. Sapabekov, “Geoinformation system for monitoring forest fires and data encryption for low-orbit vehicles,” Computer Science and Information Technologies, vol. 6, no. 1, pp. 58–67, Mar. 2025, doi: 10.11591/csit.v6i1.p58-67.
R. Cazazian, “Smart Contracts in Blockchain-based Accounting Information Systems and Artificial Intelligence-enabled Auditing Techniques,” Analysis and Metaphysics, no. 21, pp. 58-73, 2022, doi: 10.22381/am2120224.
X. Guo, Y. Zuo, and D. Li, “When auditing Meets Blockchain: A study on applying blockchain smart contracts in auditing,” International Journal of Accounting Information Systems, vol. 56, p. 100730, Dec. 2025, doi: 10.1016/j.accinf.2025.100730.
A. Tripathi and J. Prakash, “Blockchain Enabled Interpolation Based Reversible Data Hiding Mechanism for Protecting Records,” ICST Transactions on Scalable Information Systems, vol. 10, no. 5, 2023, doi: 10.4108/eetsis.v10i4.2934.
M. Y. Drygin, “Technical Diagnostics Of The Main Mining Equipment,” Mining Equipment and Electromechanics, no. 2, pp. 44–50, Jun. 2020, doi: 10.26730/1816-4528-2020-2-44-50.
Y. Wu, S. Chen, and T. Yin, “GNSS/INS Tightly Coupled Navigation with Robust Adaptive Extended Kalman Filter,” International Journal of Automotive Technology, vol. 23, no. 6, pp. 1639–1649, Dec. 2022, doi: 10.1007/s12239-022-0142-7.
K. Shikada and N. Sebe, “Similarities and differences between exosystem-model-based disturbance observer and model error compensator,” SICE Journal of Control, Measurement, and System Integration, vol. 17, no. 1, Sep. 2024, doi: 10.1080/18824889.2024.2391624.
M. Bakyt, K. Moldamurat, N. Belgibekov, A. Zhumabayeva, and A. Tilenbayev, “Development and Analysis of the Effectiveness of High-Speed Asymmetric Encryption Methods for Protecting Data from Low-Orbiting Aircraft,” Lecture Notes in Networks and Systems, pp. 189–199, 2025, doi: 10.1007/978-981-97-9327-3_16.
S. Ahmed, S. Khan, and I. Hussain, “Impact of Government Interventions on COVID-19 Outbreak in Different Provinces of Pakistan: Interrupted Time-Series Analysis,” SSRN Electronic Journal, 2020, doi: 10.2139/ssrn.3688215.
E. Pimentel, E. Boulianne, and C. Spence, “When audit confronts blockchain,” Accounting, Auditing & Accountability Journal, Dec. 2024, doi: 10.1108/aaaj-12-2023-6768.
X. Yan, Y. Lu, L. Liu, and X. Song, "Reversible Image Secret Sharing," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3848-3858, 2020, doi: 10.1109/TIFS.2020.3001735.
A. A. Dmitriev and D. V. Vasilyeva, “Research and systematization of technical diagnostics of various failures on the main nodes and components of mining equipment mechanisms in JSC Polyus Aldan,” Mining informational and analytical bulletin, no. S5, pp. 3–11, 2022, doi: 10.25018/0236_1493_2022_6_5_3.
S. Gul and H. Yeo, “Whirl Flutter Predictions for Distributed Propulsion Tiltrotor Congurations,” Journal of the American Helicopter Society, vol. 70, no. 1, pp. 1–13, Jan. 2025, doi: 10.4050/jahs.70.012001.
M. Bakyt, K. Moldamurat, D. Satybaldina, and N. Yurkov, “Modeling Information Security Threats for the Terrestrial Segment of Space Communications,” DTESI, 2022.
X. Li, W. Qian, L. Xiao, X. Ai, and J. Liu, “Optimized Design and Test of Geometrically Nonlinear Static Aeroelasticity Model for High-Speed High-Aspect-Ratio Wing,” Aerospace, vol. 11, no. 12, p. 1015, Dec. 2024, doi: 10.3390/aerospace11121015.
Z. Liu, L. Luo, and B. Zhang, “An Aerodynamic Design Method to Improve the High-Speed Performance of a Low-Aspect-Ratio Tailless Aircraft,” Applied Sciences, vol. 11, no. 4, p. 1555, Feb. 2021, doi: 10.3390/app11041555.
Y. Sun, L. Yan, Z. Sun, and S. Zhang, “A Novel Semi-quantum Private Comparison Scheme Using Bell Entangle States,” Computers, Materials & Continua, vol. 66, no. 3, pp. 2385–2395, 2021, doi: 10.32604/cmc.2021.012696.
D. R. Babu and R. Jayaraman, “A Quantum Key Distribution Protocol Based on Random Bell Pair Selection,” Journal of Computer Science, vol. 19, no. 9, pp. 1160–1169, Sep. 2023, doi: 10.3844/jcssp.2023.1160.1169.
M. Silva, R. Faleiro, P. Mateus, and E. Z. Cruzeiro, “A coherence-witnessing game and applications to semi-device-independent quantum key distribution,” Quantum, vol. 7, p. 1090, Aug. 2023, doi: 10.22331/q-2023-08-22-1090.
F. A. A. Andrade et al., “Autonomous Unmanned Aerial Vehicles in Search and Rescue Missions Using Real-Time Cooperative Model Predictive Control,” Sensors, vol. 19, no. 19, p. 4067, Sep. 2019, doi: 10.3390/s19194067.
M. R. Jafarinasab, S. Sirouspour, and E. Dyer, “Model-Based Motion Control of a Robotic Manipulator With a Flying Multirotor Base,” IEEE-ASME Transactions on Mechatronics, vol. 24, no. 5, pp. 2328–2340, Aug. 2019, doi: 10.1109/tmech.2019.2936760.
B. Yan, C. Wu, and P. Shi, “Formation consensus for discrete-time heterogeneous multi-agent systems with link failures and actuator/sensor faults,” Journal of the Franklin Institute, vol. 356, no. 12, pp. 6547–6570, Aug. 2019, doi: 10.1016/j.jfranklin.2019.03.028.
Z. Sui, Z. Pu, J. Yi, and S. Wu, “Formation Control With Collision Avoidance Through Deep Reinforcement Learning Using Model-Guided Demonstration,” IEEE Transactions on Neural Networks and Learning Systems, vol. 32, no. 6, pp. 2358–2372, Jun. 2021, doi: 10.1109/tnnls.2020.3004893.
D. Huang, H. Li, and X. Li, “Formation of Generic UAVs-USVs System Under Distributed Model Predictive Control Scheme,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 67, no. 12, pp. 3123–3127, Dec. 2020, doi: 10.1109/tcsii.2020.2983096.
S. Acharya, A. Bharadwaj, Y. Simmhan, A. Gopalan, P. Parag, and H. Tyagi, "CORNET: A Co-Simulation Middleware for Robot Networks," 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 245-251, 2020, doi: 10.1109/COMSNETS48256.2020.9027459.
J. F. Hair, J. J. Risher, M. Sarstedt, and C. M. Ringle, “When to use and how to report the results of PLS-SEM,” European Business Review, vol. 31, no. 1, pp. 2–24, 2019, doi: 10.1108/EBR-11-2018-0203.
W. Ma, X. Pi, and S. Qian, “Estimating multi-class dynamic origin-destination demand through a forward-backward algorithm on computational graphs,” Transportation Research Part C-emerging Technologies, vol. 119, Oct. 2020, doi: 10.1016/j.trc.2020.102747.
K.-S. Shim, B. Kim, and W. Lee, “Research on Quantum Key, Distribution Key and Post-quantum Cryptography Key Applied Protocols for Data Science and Web Security,” Journal of Web Engineering, pp. 813–830, Nov. 2024, doi: 10.13052/jwe1540-9589.2365.
O. Grote and A. Ahrens, “Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution,” Electrical, Control and Communication Engineering, vol. 18, no. 1, pp. 43–49, Jun. 2022, doi: 10.2478/ecce-2022-0006.
A. Pradana and L. Y. Chew, “Quantum interference of multi-photon at beam splitter with application in measurement-device-independent quantum key distribution,” New Journal of Physics, vol. 21, no. 5, p. 053027, May 2019, doi: 10.1088/1367-2630/ab1bbf.
D. Wang, J. Gao, H. Bai, L. Wang, C. Huo, and J. Yuan, “Application of Quantum Key in Secure Communication for Power Distribution and Utilization,” International Journal of Information and Electronics Engineering, vol. 9, no. 3, pp. 63–66, Sep. 2019, doi: 10.18178/ijiee.2019.9.3.707.
R. Ghali and M. A. Akhloufi, “Deep Learning Approach for Wildland Fire Recognition Using RGB and Thermal Infrared Aerial Image,” Fire, vol. 7, no. 10, Sep. 2024, doi: 10.3390/fire7100343.
I. El-Madafri, M. Peña, and N. Olmedo-Torre, “Real-Time Forest Fire Detection with Lightweight CNN Using Hierarchical Multi-Task Knowledge Distillation,” Fire, vol. 7, no. 11, p. 392, Oct. 2024, doi: 10.3390/fire7110392.
X. Hu et al., “AF-Net: An Active Fire Detection Model Using Improved Object-Contextual Representations on Unbalanced UAV Datasets,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 17, pp. 13558–13569, 2024, doi: 10.1109/jstars.2024.3406767.
S. N. Saydirasulovich, M. Mukhiddinov, O. Djuraev, A. Abdusalomov, and Y.-I. Cho, “An Improved Wildfire Smoke Detection Based on YOLOv8 and UAV Images,” Sensors, vol. 23, no. 20, p. 8374, Jan. 2023, doi: 10.3390/s23208374.
S. S. Dhanda, P. Jindal, B. Singh, and D. Panwar, “A compact and efficient AES-32GF for encryption in small IoT devices,” MethodsX, vol. 11, Dec. 2023, doi: 10.1016/j.mex.2023.102491.
Z. Liu, Z. Wang, S. Tu, H. Wang, J. Fan, and C. Ren, “Real-Time Secure Video Streaming System Based on FPGA and CUDA Technology,” Proceedings of the 2024 14th International Conference on Communication and Network Security, pp. 146–152, 2024, doi: 10.1145/3711618.3711642.
X.-H. Tian et al., “Experimental Demonstration of Drone-Based Quantum Key Distribution,” Physical Review Letters, vol. 133, no. 20, Nov. 2024, doi: 10.1103/physrevlett.133.200801.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Khuralay Moldamurat, Luigi La Spada, Nida Zeeshan, Makhabbat Bakyt, Absalyam Kuanysh, Kazybek bi Zhanibek, Alzhan Tilenbayev

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License