Affiliation:
1. College of Information Engineering, Hainan Vocational University of Science and Technology , Haikou , 571126, Hainan , China
Abstract
Abstract
With the continuous improvement of China’s current technology level, the Internet of Things (IoT) technology is also increasingly widely used in various fields. IoT is a network composed of electronic components, software, sensors, etc. With the development of IoT technology, users’ demand for remote control equipment is increasingly urgent. In this article, the genetic algorithm–backpropagation neural network (GA–BPNN) algorithm was deeply studied by combining genetic algorithm (GA) and backpropagation neural network (BPNN) algorithm, and its application in network security evaluation was discussed. This article mainly studied the security and remote control technology of computer network and applied it to intelligent agriculture. In the evaluation performance test of the GA–BPNN algorithm, the evaluation accuracy of GA, BPNN, and GA–BPNN under simple difficulty was 99.58, 99.15, and 99.92%, respectively, and the evaluation accuracy under difficulty was 96.72, 96.47, and 98.88%, respectively. This proved the effectiveness of the GA–BPNN algorithm. In addition, in the application of smart agriculture, through the experimental data and concentration change data, it can be seen that the use of air-driven
CO
2
{\text{CO}}_{2}
(carbon dioxide) for concentration replenishment can effectively adjust the requirements of crops on the concentration of
CO
2
{\text{CO}}_{2}
. Through the analysis of the system’s light compensation system, it was proved that the system has a good structure and remarkable light compensation effect; it can replenish light for crops in time, and the PLC control structure has good working performance. The correctness of the system design was proved.
Reference20 articles.
1. M. A. Naagas, E. L. Mique Jr, T. D. Palaoag, and J. S. Dela Cruz, “Defense-through-deception network security model: Securing university campus network from DOS/DDOS attack,” Bull. Electr. Eng. Inform., vol. 7, no. 4, pp. 593–600, 2018.
2. P. Lin and Y. Chen, “Network security situation assessment based on text simhash in big data environment,” Int. J. Netw. Secur., vol. 21, no. 4, pp. 699–708, 2019.
3. A. K. Jain, S. R. Sahoo, and J. Kaubiyal, “Online social networks security and privacy: Comprehensive review and analysis,” Complex Intell. Syst., vol. 7, no. 5, pp. 2157–2177, 2021.
4. M. Zhao, G. Wei, C. Wei, and Y. Guo, “CPT‐TODIM method for bipolar fuzzy multi‐attribute group decision making and its application to network security service provider selection,” Int. J. Intell. Syst., vol. 36, no. 5, pp. 1943–1969, 2021.
5. C. Liang, Q. Zhang, J. Ma, and K. Li, “Research on neural network chaotic encryption algorithm in wireless network security communication,” EURASIP J. Wirel. Commun. Netw., vol. 2019, no. 1, pp. 1–10, 2019.