Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Figure 5

The input and output membership functions for the purposed fuzzy inference system.
(a) The shape of input membership function
(b) The shape of output membership function