Fig. 8From: RETRACTED ARTICLE: Invulnerability mechanism based on mobility prediction and opportunistic cloud computing with topological evolution for wireless multimedia sensor networksPerformance evaluation of invulnerability. a Sending node failure probability. b Number of failure node. c System execution efficiencyBack to article page