Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Table 2

Rules for Mamdani fuzzy inference system.

DelayCPU usageAcceptance level

LowHighHighly acceptable
LowMiddleAcceptable
LowLowAcceptable
MiddleHighAcceptable
MiddleMiddleUncertain
MiddleLowUnacceptable
HighHighUnacceptable
HighMiddleUnacceptable
HighLowCompletely unacceptable