2021
DOI: 10.1016/j.comcom.2021.04.019
|View full text |Cite
|
Sign up to set email alerts
|

Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“…e final results show that the optimization model based on analytic hierarchy theory can accurately characterize the safety and reliability of traffic transportation. In view of the relevant problems existing in the construction of the Internet, as well as for the targeted evaluation and analysis of the Internet, an atomization method based on the theory of fuzzy analytic hierarchy process was proposed in [2]. e method firstly iteratively analyzes the evaluation data of the Internet, and then obtains the optimized corresponding parameters, and then imports the data into the fuzzy hierarchy analysis function.…”
Section: Introductionmentioning
confidence: 99%
“…e final results show that the optimization model based on analytic hierarchy theory can accurately characterize the safety and reliability of traffic transportation. In view of the relevant problems existing in the construction of the Internet, as well as for the targeted evaluation and analysis of the Internet, an atomization method based on the theory of fuzzy analytic hierarchy process was proposed in [2]. e method firstly iteratively analyzes the evaluation data of the Internet, and then obtains the optimized corresponding parameters, and then imports the data into the fuzzy hierarchy analysis function.…”
Section: Introductionmentioning
confidence: 99%
“…Step 1: In the first step, experts’ judgements for rating the one criterion over the other are obtained from each conducted experiment, which is then converted into a matrix form, as mentioned by Verma and Chandra (2021). This would provide a pairwise comparison matrix of the criterion in linguistic terms for each experiment.…”
Section: Methodsmentioning
confidence: 99%
“…A pairwise comparison matrix of CE challenges in linguistic terms from each experiment had been obtained (Verma and Chandra, 2021), which were further converted to IVIF sets using the conversion scale provided in Table 6. A pairwise comparison matrix of CE challenges obtained from experiment 1 in linguistic term had been shown in Table 7 and its conversion into IVIF sets had been presented in Table 8.…”
Section: Numerical Illustrationmentioning
confidence: 99%
“…To measure risk, two different types of risk estimation methods, risk assessment and fuzzy models, have been developed. To rank the elements at both levels in an edge-fogcloud context, a study [176] used AHP based on interval-valued intuitionistic fuzzy sets (IVIFS). The Fog-IoT security factors and their subfactors are prioritised and ranked using this integrated approach.…”
Section: Fuzzy Inference Systemmentioning
confidence: 99%