{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:39:26Z","timestamp":1772912366007,"version":"3.50.1"},"reference-count":20,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>With the continuous improvement of China\u2019s current technology level, the Internet of Things (IoT) technology is also increasingly widely used in various fields. IoT is a network composed of electronic components, software, sensors, etc. With the development of IoT technology, users\u2019 demand for remote control equipment is increasingly urgent. In this article, the genetic algorithm\u2013backpropagation neural network (GA\u2013BPNN) algorithm was deeply studied by combining genetic algorithm (GA) and backpropagation neural network (BPNN) algorithm, and its application in network security evaluation was discussed. This article mainly studied the security and remote control technology of computer network and applied it to intelligent agriculture. In the evaluation performance test of the GA\u2013BPNN algorithm, the evaluation accuracy of GA, BPNN, and GA\u2013BPNN under simple difficulty was 99.58, 99.15, and 99.92%, respectively, and the evaluation accuracy under difficulty was 96.72, 96.47, and 98.88%, respectively. This proved the effectiveness of the GA\u2013BPNN algorithm. In addition, in the application of smart agriculture, through the experimental data and concentration change data, it can be seen that the use of air-driven <jats:inline-formula>\n                     <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_comp-2024-0004_eq_001.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                           <m:msub>\n                              <m:mrow>\n                                 <m:mtext>CO<\/m:mtext>\n                              <\/m:mrow>\n                              <m:mrow>\n                                 <m:mn>2<\/m:mn>\n                              <\/m:mrow>\n                           <\/m:msub>\n                        <\/m:math>\n                        <jats:tex-math>{\\text{CO}}_{2}<\/jats:tex-math>\n                     <\/jats:alternatives>\n                  <\/jats:inline-formula> (carbon dioxide) for concentration replenishment can effectively adjust the requirements of crops on the concentration of <jats:inline-formula>\n                     <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_comp-2024-0004_eq_002.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                           <m:msub>\n                              <m:mrow>\n                                 <m:mtext>CO<\/m:mtext>\n                              <\/m:mrow>\n                              <m:mrow>\n                                 <m:mn>2<\/m:mn>\n                              <\/m:mrow>\n                           <\/m:msub>\n                        <\/m:math>\n                        <jats:tex-math>{\\text{CO}}_{2}<\/jats:tex-math>\n                     <\/jats:alternatives>\n                  <\/jats:inline-formula>. Through the analysis of the system\u2019s light compensation system, it was proved that the system has a good structure and remarkable light compensation effect; it can replenish light for crops in time, and the PLC control structure has good working performance. The correctness of the system design was proved.<\/jats:p>","DOI":"10.1515\/comp-2024-0004","type":"journal-article","created":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T14:41:09Z","timestamp":1720795269000},"source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of Internet of Things computer network security and remote control technology"],"prefix":"10.1515","volume":"14","author":[{"given":"Haifeng","family":"Lu","sequence":"first","affiliation":[{"name":"College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China"}]},{"given":"Haiwei","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China"}]},{"given":"Ru","family":"Jing","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China"}]}],"member":"374","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"2024071214404499280_j_comp-2024-0004_ref_001","doi-asserted-by":"crossref","unstructured":"M. A. Naagas, E. L. Mique Jr, T. D. Palaoag, and J. S. Dela Cruz, \u201cDefense-through-deception network security model: Securing university campus network from DOS\/DDOS attack,\u201d Bull. Electr. Eng. Inform., vol. 7, no. 4, pp. 593\u2013600, 2018.","DOI":"10.11591\/eei.v7i4.1349"},{"key":"2024071214404499280_j_comp-2024-0004_ref_002","unstructured":"P. Lin and Y. Chen, \u201cNetwork security situation assessment based on text simhash in big data environment,\u201d Int. J. Netw. Secur., vol. 21, no. 4, pp. 699\u2013708, 2019."},{"key":"2024071214404499280_j_comp-2024-0004_ref_003","doi-asserted-by":"crossref","unstructured":"A. K. Jain, S. R. Sahoo, and J. Kaubiyal, \u201cOnline social networks security and privacy: Comprehensive review and analysis,\u201d Complex Intell. Syst., vol. 7, no. 5, pp. 2157\u20132177, 2021.","DOI":"10.1007\/s40747-021-00409-7"},{"key":"2024071214404499280_j_comp-2024-0004_ref_004","doi-asserted-by":"crossref","unstructured":"M. Zhao, G. Wei, C. Wei, and Y. Guo, \u201cCPT\u2010TODIM method for bipolar fuzzy multi\u2010attribute group decision making and its application to network security service provider selection,\u201d Int. J. Intell. Syst., vol. 36, no. 5, pp. 1943\u20131969, 2021.","DOI":"10.1002\/int.22367"},{"key":"2024071214404499280_j_comp-2024-0004_ref_005","doi-asserted-by":"crossref","unstructured":"C. Liang, Q. Zhang, J. Ma, and K. Li, \u201cResearch on neural network chaotic encryption algorithm in wireless network security communication,\u201d EURASIP J. Wirel. Commun. Netw., vol. 2019, no. 1, pp. 1\u201310, 2019.","DOI":"10.1186\/s13638-019-1476-3"},{"key":"2024071214404499280_j_comp-2024-0004_ref_006","doi-asserted-by":"crossref","unstructured":"N. Sultana, N. Chilmakurti, W. Peng, and R. Alhadad, \u201cSurvey on SDN based network intrusion detection system using machine learning approaches,\u201d Peer-to-Peer Netw. Appl., vol. 12, no. 2, pp. 493\u2013501, 2019.","DOI":"10.1007\/s12083-017-0630-0"},{"key":"2024071214404499280_j_comp-2024-0004_ref_007","doi-asserted-by":"crossref","unstructured":"A. Alabady Salah, F. Al-Turjman, and S. Din, \u201cA novel security model for cooperative virtual networks in the IoT era,\u201d Int. J. Parallel Program., vol. 48, no. 2, pp. 280\u2013295, 2020.","DOI":"10.1007\/s10766-018-0580-z"},{"key":"2024071214404499280_j_comp-2024-0004_ref_008","doi-asserted-by":"crossref","unstructured":"T. A. Assegie and P. S. Nair, \u201cA review on software defined network security risks and challenges,\u201d TELKOMNIKA (Telecommun. Comput. Electron. Control.), vol. 17, no. 6, pp. 3168\u20133174, 2019.","DOI":"10.12928\/telkomnika.v17i6.13119"},{"key":"2024071214404499280_j_comp-2024-0004_ref_009","doi-asserted-by":"crossref","unstructured":"K. Maithili, V. Vinothkumar, and P. Latha, \u201cAnalyzing the security mechanisms to prevent unauthorized access in cloud and network security,\u201d J. Comput. Theor. Nanosci., vol. 15, no. 6\u20137, pp. 2059\u20132063, 2018.","DOI":"10.1166\/jctn.2018.7407"},{"key":"2024071214404499280_j_comp-2024-0004_ref_010","unstructured":"V. Jyothsna and K. M. Prasad, \u201cAnomaly-based intrusion detection system,\u201d Computer Netw. Secur., vol. 2, no. 1, pp. 35\u201351, 2019."},{"key":"2024071214404499280_j_comp-2024-0004_ref_011","unstructured":"F. Fikriyadi, R. Ritzkal, and B. A. Prakosa, \u201cSecurity analysis of Wireless Local Area Network (WLAN) network with the penetration testing method,\u201d J. Mantik, vol. 4, no. 3, pp. 1658\u20131662, 2020."},{"key":"2024071214404499280_j_comp-2024-0004_ref_012","unstructured":"M. Almulhim, N. Islam, and N. Zaman, \u201cA lightweight and secure authentication scheme for IoT based e-health applications,\u201d Int. J. Computer Sci. Netw. Secur., vol. 19, no. 1, pp. 107\u2013120, 2019."},{"key":"2024071214404499280_j_comp-2024-0004_ref_013","doi-asserted-by":"crossref","unstructured":"Z. Ye, Y. Guo, A. Ju, F. Wei, R. Zhang, and J. Ma, \u201cA risk analysis framework for social engineering attack based on user profiling,\u201d J. Organ. End. User Comput., vol. 32, no. 3, pp. 37\u201349, 2020.","DOI":"10.4018\/JOEUC.2020070104"},{"key":"2024071214404499280_j_comp-2024-0004_ref_014","unstructured":"M. A. M. Abu-Faraj and Z. A. Alqadi, \u201cUsing highly secure data encryption method for text file cryptography,\u201d Int. J. Computer Sci. Netw. Secur., vol. 21, no. 12, pp. 53\u201360, 2021."},{"key":"2024071214404499280_j_comp-2024-0004_ref_015","doi-asserted-by":"crossref","unstructured":"B. P. Patil, K. G. Kharade, and R. K. Kamat, \u201cInvestigation on data security threats & solutions,\u201d Int. J. Innov. Sci. Res. Technol., vol. 5, no. 1, pp. 79\u201383, 2020.","DOI":"10.9734\/bpi\/ramrcs\/v1\/6978D"},{"key":"2024071214404499280_j_comp-2024-0004_ref_016","doi-asserted-by":"crossref","unstructured":"SophosLabs Research Team, \u201cEmotet exposed: Looking inside highly destructive malware,\u201d Netw. Secur., vol. 2019, no. 6, pp. 6\u201311, 2019.","DOI":"10.1016\/S1353-4858(19)30071-6"},{"key":"2024071214404499280_j_comp-2024-0004_ref_017","doi-asserted-by":"crossref","unstructured":"A. Aljumah and T. A. Ahanger, \u201cCyber security threats, challenges and defence mechanisms in cloud computing,\u201d IET Commun., vol. 14, no. 7, pp. 1185\u20131191, 2020.","DOI":"10.1049\/iet-com.2019.0040"},{"key":"2024071214404499280_j_comp-2024-0004_ref_018","doi-asserted-by":"crossref","unstructured":"S. Venkatraman and P. Arun Raj Kumar, \u201cImproving Adhoc wireless sensor networks security using distributed automaton,\u201d Clust. Comput., vol. 22, no. 6, pp. 14551\u201314557, 2019.","DOI":"10.1007\/s10586-018-2352-3"},{"key":"2024071214404499280_j_comp-2024-0004_ref_019","doi-asserted-by":"crossref","unstructured":"J. Deng, C.-S. Lam, M.-C. Wong, L. Wang, S.-W. Sin, and R. P. Martins, \u201cA power quality indexes measurement system platform with remote alarm notification,\u201d in I ECON 2018 \u2013 44TH Annual Conference of The IEEE Industrial Electronics Society, pp. 3461\u20133465, 2018.","DOI":"10.1109\/IECON.2018.8591375"},{"key":"2024071214404499280_j_comp-2024-0004_ref_020","doi-asserted-by":"crossref","unstructured":"X. M. Li, H. Liu, W. X. Wang, Y. Zheng, H. B. Lv, and Z. H. Lv. \u201cBig data analysis of the internet of things in the digital twins of smart city based on deep learning\u201d, Future Generation Computer Systems, vol. 128, pp. 167\u2013177, 2021.","DOI":"10.1016\/j.future.2021.10.006"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2024-0004\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2024-0004\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T14:41:30Z","timestamp":1720795290000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2024-0004\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,7,12]]},"published-print":{"date-parts":[[2024,7,12]]}},"alternative-id":["10.1515\/comp-2024-0004"],"URL":"https:\/\/doi.org\/10.1515\/comp-2024-0004","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"20240004"}}