{"id":"https://openalex.org/W4400582901","doi":"https://doi.org/10.1515/comp-2024-0004","title":"Evaluation of Internet of Things computer network security and remote control technology","display_name":"Evaluation of Internet of Things computer network security and remote control technology","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400582901","doi":"https://doi.org/10.1515/comp-2024-0004"},"language":"en","primary_location":{"id":"doi:10.1515/comp-2024-0004","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1515/comp-2024-0004","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0004/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0004/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063242031","display_name":"Haifeng Lu","orcid":"https://orcid.org/0000-0002-1245-9738"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haifeng Lu","raw_affiliation_strings":["College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111009537","display_name":"Haiwei Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Haiwei Wu","raw_affiliation_strings":["College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006740324","display_name":"Jing Ru","orcid":"https://orcid.org/0000-0001-6625-3869"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ru Jing","raw_affiliation_strings":["College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111009537"],"corresponding_institution_ids":[],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.993,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76685985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9696000218391418,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7296309471130371},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6082487106323242},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5567491054534912},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5413122177124023},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4801706373691559},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.47206977009773254},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.421970933675766},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36199647188186646},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3473805785179138},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.22113201022148132},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.21044591069221497},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07845881581306458}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7296309471130371},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6082487106323242},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5567491054534912},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5413122177124023},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4801706373691559},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.47206977009773254},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.421970933675766},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36199647188186646},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3473805785179138},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.22113201022148132},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.21044591069221497},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07845881581306458}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/comp-2024-0004","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1515/comp-2024-0004","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0004/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1f4522be36a24fc18b633caaa4472433","is_oa":false,"landing_page_url":"https://doaj.org/article/1f4522be36a24fc18b633caaa4472433","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Open Computer Science, Vol 14, Iss 1, Pp pp. 593-600 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/comp-2024-0004","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1515/comp-2024-0004","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0004/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Zero hunger","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/2"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400582901.pdf","grobid_xml":"https://content.openalex.org/works/W4400582901.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W2782735691","https://openalex.org/W2791502361","https://openalex.org/W2886643346","https://openalex.org/W2901579984","https://openalex.org/W2904582993","https://openalex.org/W2907013193","https://openalex.org/W2948358560","https://openalex.org/W2949528415","https://openalex.org/W2966178836","https://openalex.org/W2976807976","https://openalex.org/W3005605371","https://openalex.org/W3031675477","https://openalex.org/W3121291928","https://openalex.org/W3134744475","https://openalex.org/W3170330193","https://openalex.org/W3207740732","https://openalex.org/W3207844197","https://openalex.org/W4212881072"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W2793714691","https://openalex.org/W2529599869"],"abstract_inverted_index":{"Abstract":[0],"With":[1,35],"the":[2,10,36,53,87,103,108,111,129,142,145,151,157,169,193,198,215,218,227,247,258],"continuous":[3],"improvement":[4],"of":[5,12,29,38,93,107,114,144,153,171,195,200,217,257],"China\u2019s":[6],"current":[7],"technology":[8,15,92],"level,":[9],"Internet":[11],"Things":[13],"(IoT)":[14],"is":[16,25,47],"also":[17],"increasingly":[18,48],"widely":[19],"used":[20],"in":[21,77,150,244],"various":[22],"fields.":[23],"IoT":[24,39],"a":[26,230],"network":[27,57,71,78,95],"composed":[28],"electronic":[30],"components,":[31],"software,":[32],"sensors,":[33],"etc.":[34],"development":[37],"technology,":[40],"users\u2019":[41],"demand":[42],"for":[43,187,242],"remote":[44,90],"control":[45,91,249],"equipment":[46],"urgent.":[49],"In":[50,102,148],"this":[51],"article,":[52],"genetic":[54,65],"algorithm\u2013backpropagation":[55],"neural":[56,70],"(GA\u2013BPNN)":[58],"algorithm":[59,66],"was":[60,81,122,134,224,261],"deeply":[61],"studied":[62,86],"by":[63],"combining":[64],"(GA)":[67],"and":[68,74,89,96,117,125,128,137,160,233,246],"backpropagation":[69],"(BPNN)":[72],"algorithm,":[73,110],"its":[75],"application":[76,152],"security":[79,88],"evaluation":[80,104,112,130],"discussed.":[82],"This":[83,140],"article":[84],"mainly":[85],"computer":[94],"applied":[97],"it":[98,164,223,238],"to":[99],"intelligent":[100],"agriculture.":[101],"performance":[105],"test":[106],"GA\u2013BPNN":[109,118,146],"accuracy":[113,131],"GA,":[115],"BPNN,":[116],"under":[119,132],"simple":[120],"difficulty":[121,133],"99.58,":[123],"99.15,":[124],"99.92%,":[126],"respectively,":[127],"96.72,":[135],"96.47,":[136],"98.88%,":[138],"respectively.":[139],"proved":[141,225],"effectiveness":[143],"algorithm.":[147],"addition,":[149],"smart":[154],"agriculture,":[155],"through":[156],"experimental":[158],"data":[159],"concentration":[161,188,199],"change":[162],"data,":[163],"can":[165,190,239],"be":[166],"seen":[167],"that":[168,226],"use":[170],"air-driven":[172],"<m:math":[173,201],"xmlns:m=\"http://www.w3.org/1998/Math/MathML\">":[174,202],"<m:msub>":[175,203],"<m:mrow>":[176,179,204,207],"<m:mtext>CO</m:mtext>":[177,205],"</m:mrow>":[178,181,206,209],"<m:mn>2</m:mn>":[180,208],"</m:msub>":[182,210],"</m:math>":[183,211],"{\\text{CO}}_{2}":[184,212],"(carbon":[185],"dioxide)":[186],"replenishment":[189],"effectively":[191],"adjust":[192],"requirements":[194],"crops":[196,243],"on":[197],".":[213],"Through":[214],"analysis":[216],"system\u2019s":[219],"light":[220,235,241],"compensation":[221,236],"system,":[222],"system":[228,259],"has":[229,251],"good":[231,252],"structure":[232,250],"remarkable":[234],"effect;":[237],"replenish":[240],"time,":[245],"PLC":[248],"working":[253],"performance.":[254],"The":[255],"correctness":[256],"design":[260],"proved.":[262]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2024-07-13T00:00:00"}
