{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:24:12Z","timestamp":1743060252703,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031357336"},{"type":"electronic","value":"9783031357343"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35734-3_12","type":"book-chapter","created":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T08:01:20Z","timestamp":1687075280000},"page":"116-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and\u00a0Performance Evaluation of\u00a0a\u00a0Fuzzy-Based System for\u00a0Assessment of\u00a0Emotional Trust"],"prefix":"10.1007","author":[{"given":"Shunya","family":"Higashi","sequence":"first","affiliation":[]},{"given":"Phudit","family":"Ampririt","sequence":"additional","affiliation":[]},{"given":"Ermioni","family":"Qafzezi","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,19]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"106743","DOI":"10.1109\/ACCESS.2021.3100767","volume":"9","author":"HLJ Ting","year":"2021","unstructured":"Ting, H.L.J., Kang, X., Li, T., Wang, H., Chu, C.-K.: On the trust and trust modeling for the future fully-connected digital world: a comprehensive study. IEEE Access 9, 106743\u2013106783 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3100767","journal-title":"IEEE Access"},{"issue":"3","key":"12_CR2","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/MNET.011.2000508","volume":"35","author":"C Benza\u00efd","year":"2021","unstructured":"Benza\u00efd, C., Taleb, T., Farooqi, M.Z.: Trust in 5G and beyond networks. IEEE Network 35(3), 212\u2013222 (2021)","journal-title":"IEEE Network"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.future.2018.05.061","volume":"109","author":"FH Rahman","year":"2020","unstructured":"Rahman, F.H., Au, T.-W., Newaz, S.S., Suhaili, W.S., Lee, G.M.: Find my trustworthy fogs: a fuzzy-based trust evaluation framework. Futur. Gener. Comput. Syst. 109, 562\u2013572 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"24","key":"12_CR4","doi-asserted-by":"publisher","first-page":"9905","DOI":"10.3390\/s22249905","volume":"22","author":"S Uslu","year":"2022","unstructured":"Uslu, S., Kaur, D., Durresi, M., Durresi, A.: Trustability for resilient internet of things services on 5G multiple access edge cloud computing. Sensors 22(24), 9905 (2022)","journal-title":"Sensors"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Cai, H., Li, Z., Tian, J.: A new trust evaluation model based on cloud theory in e-commerce environment. In: 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing, pp. 139\u2013142 (2011)","DOI":"10.1109\/IPTC.2011.42"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 1\u201340 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"12_CR7","unstructured":"Jantzen, J.: Tutorial on fuzzy logic. Technical University of Denmark, Department of Automation, Technical report (1998)"},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/2.53","volume":"21","author":"LA Zadeh","year":"1988","unstructured":"Zadeh, L.A.: Fuzzy logic. Computer 21(4), 83\u201393 (1988)","journal-title":"Computer"},{"issue":"2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","volume":"20","author":"CC Lee","year":"1990","unstructured":"Lee, C.C.: Fuzzy logic in control systems: fuzzy logic controller. I. IEEE Trans. Syst. Man Cybern. 20(2), 404\u2013418 (1990)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/5.364485","volume":"83","author":"JM Mendel","year":"1995","unstructured":"Mendel, J.M.: Fuzzy logic systems for engineering: a tutorial. Proc. IEEE 83(3), 345\u2013377 (1995)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Complex, Intelligent and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35734-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T04:38:35Z","timestamp":1739767115000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35734-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031357336","9783031357343"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35734-3_12","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto Metropolitan University, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/cisis\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}