Research Article
Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing
Table 2
Rules for Mamdani fuzzy inference system.
| Delay | CPU usage | Acceptance level |
| Low | High | Highly acceptable | Low | Middle | Acceptable | Low | Low | Acceptable | Middle | High | Acceptable | Middle | Middle | Uncertain | Middle | Low | Unacceptable | High | High | Unacceptable | High | Middle | Unacceptable | High | Low | Completely unacceptable |
|
|