Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.1007/s12652-017-0676-0
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…As shown in Figure , we use triangular and trapezoidal membership functions for FLC because they are suitable for real‐time operation . The x 0 in f ( x ) is the center of triangular function, x 0 ( x 1 ) in g ( x ) is the left (right) edge of trapezoidal function, and a 0 ( a 1 ) is the left (right) width of the triangular or trapezoidal function …”
Section: Proposed and Implemented Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Figure , we use triangular and trapezoidal membership functions for FLC because they are suitable for real‐time operation . The x 0 in f ( x ) is the center of triangular function, x 0 ( x 1 ) in g ( x ) is the left (right) edge of trapezoidal function, and a 0 ( a 1 ) is the left (right) width of the triangular or trapezoidal function …”
Section: Proposed and Implemented Systemsmentioning
confidence: 99%
“…28 The x 0 in f(x) is the center of triangular function, x 0 (x 1 ) in g(x) is the left (right) edge of trapezoidal function, and a 0 (a 1 ) is the left (right) width of the triangular or trapezoidal function. 29…”
Section: Implemented Systemsmentioning
confidence: 99%
“…In fact, the emergence of this trend is mainly due to the evolution of wireless technology combined with Internet enhancement and the large demand for high-quality sensing devices enabling smart living applications. From a technological point of view, IoT can be seen as a consequence of machine-to-machine (M2M) architecture and its connectivity [1]. This key concept refers to the interconnection of machines via a network without any human intervention.…”
Section: Introductionmentioning
confidence: 99%
“…This network enables connected objects to access, interpret, exchange and monitor the information of each other [1]. In IoT, the information are shared to make real time decisions, coordinate intelligence and deliver the ubiquitous services to the users by enabling the collaboration of physical objects without human interference [2]. However, major development in the field is facing potential security threats associated with each layer of its framework.…”
Section: Introductionmentioning
confidence: 99%