(IJETA-V7I5P7) :shashidhar Kasthala
(IJETA-V7I5P7) :shashidhar Kasthala
(IJETA-V7I5P7) :shashidhar Kasthala
REFERENCE
[1] Anand Nayyar, Vikram Puri,
Nhu Gia Nguyen, Dac Nhuong Le, Smart
Surveillance Robot for the Real Time
Monitoring and Control System in
Environment and Industrial Applications,
Advances in Intelligent System and
Computing, pp 229-243, Springer
[2] Ezhilarasu, P., & Krishnaraj, N. (2015).
Applications of Finite Automata in Lexical
Figure 1: PDR Analysis
Analysis and as a Ticket Vending Machine–
A Review. Int. J. Comput. Sci. Eng.
Technol, 6(05), 267-270.
[3] Agrawal, U., Arora, J., Singh, R., Gupta, D.,
Khanna, A., & Khamparia, A. (2020).
Hybrid Wolf-Bat Algorithm for
Optimization of Connection Weights in
Multi-layer Perceptron. ACM Transactions
on Multimedia Computing,
Communications, and Applications
(TOMM), 16(1s), 1-20.
[4] Prasanna, S., & Ezhilmaran, D. (2016).
Association rule mining using enhanced
apriori with modified GA for stock
prediction. International Journal of Data
Mining, Modelling and Management, 8(2),
195-207.
Figure 2: NLT analysis [5] Pustokhina, I. V., Pustokhin, D. A., Gupta,
Figure 1 and 2 shows the results for PDR and D., Khanna, A., Shankar, K., & Nguyen, G.
NLT, Compared to all the techniques, the proposed N. (2020). An effective training scheme for
model gets maximum that means the routing deep neural network in edge computing
protocol chooses the trust node and carry out the enabled Internet of medical things (IoMT)
data forwarding while constructing the WSN systems. IEEE Access, 8, 107112-107123.
process. Our proposed clustering achieves 35% for
all the parameters and reaches 40% in PDR so; it [6] Shankar, K., Zhang, Y., Liu, Y., Wu, L., &
has the route recovery mechanism. In the route Chen, C. H. (2020). Hyperparameter tuning
recovery procedures, the consumption begins to deep learning for diabetic retinopathy fundus
increase when the speed increase. image classification. IEEE Access, 8,
118164-118173.
VI. CONCLUSION [7] Joshi, G. P., Perumal, E., Shankar, K., Tariq,
U., Ahmad, T., & Ibrahim, A. (2020).
The privacy and security of data are the real issues Toward Blockchain-Enabled Privacy-
worried about the wireless sensor networks. Preserving Data Transmission in Cluster-
Extraordinary avoidance methods are required to Based Vehicular
manage the clone node attacks in WSNs. Networks. Electronics, 9(9), 1358.
Moreover, the principle goal of this procedure was [8] Saračević, M. H., Adamović, S. Z.,
to maximize replica detection level on the number Miškovic, V. A., Elhoseny, M., Maček, N.
of nodes, clusters, and privacy of the transmission. D., Selim, M. M., & Shankar, K. (2020).
Our proposed detection model This is because Data Encryption for Internet of Things