Research Article
Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing
Figure 5
The input and output membership functions for the purposed fuzzy inference system.
(a) The shape of input membership function |
(b) The shape of output membership function |