Research Article

[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT

Table 5

Power aware analysis.

Node idCPU powerLPM powerListen powerTransmitpower

10.390.150.440.21
20.440.150.740.18
30.410.150.610.19
40.380.150.510.16
50.380.150.450.18
60.370.150.440.12
70.420.150.660.19
80.410.150.520.28
90.380.150.470.20
100.390.150.610.12
110.430.150.530.23
120.370.150.460.18
130.380.150.460.17
140.420.150.660.25
150.450.150.740.25
160.370.150.410.13
170.420.150.600.28
180.370.150.440.14
190.360.150.500.12
200.400.150.600.20
210.390.150.440.21
220.400.150.440.52
230.380.150.400.18
240.370.150.420.12
250.380.150.450.21