Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Table 6

Relative membership degree of CPU usage.

ā€‰VM1VM2VM3VM4

Function 10.9700.990.99
Function 20.060.030.050.02
Function 300.040.030.02
Function 40.730.800.790.77