Skip to main content
. 2022 Dec 27;2022:7498025. doi: 10.1155/2022/7498025

Table 3.

Comparison and analysis.

Performance Index Literature [21] Literature [30] This paper
Security Data security Middle High High
Vulnerability High Middle Low
Timeliness Low Middle High

Model efficiency Throughout Low High High
Delay High Middle Low

Scalability Resource consumption Middle Lower Low