Research Article
Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing
Table 6
Relative membership degree of CPU usage.
| ā | VM1 | VM2 | VM3 | VM4 |
| Function 1 | 0.97 | 0 | 0.99 | 0.99 | Function 2 | 0.06 | 0.03 | 0.05 | 0.02 | Function 3 | 0 | 0.04 | 0.03 | 0.02 | Function 4 | 0.73 | 0.80 | 0.79 | 0.77 |
|
|