{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:40:07Z","timestamp":1742920807367,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031409776"},{"type":"electronic","value":"9783031409783"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40978-3_19","type":"book-chapter","created":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T05:01:33Z","timestamp":1692766893000},"page":"170-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Fuzzy-Based Approach for\u00a0Assessment of\u00a0Emotional Trust Considering Four Input Parameters for\u00a0Implemented System"],"prefix":"10.1007","author":[{"given":"Shunya","family":"Higashi","sequence":"first","affiliation":[]},{"given":"Phudit","family":"Ampririt","sequence":"additional","affiliation":[]},{"given":"Ermioni","family":"Qafzezi","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,24]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Ting, H.L.J., Kang, X., Li, T., Wang, H., Chu, C.K.: On the trust and trust modeling for the future fully-connected digital world: a comprehensive study. IEEE Access 9, 106 743\u2013106 783 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3100767","DOI":"10.1109\/ACCESS.2021.3100767"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Wang, D., Muller, T., Liu, Y., Zhang, J.: Towards robust and effective trust management for security: a survey. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 511\u2013518 (2014)","DOI":"10.1109\/TrustCom.2014.65"},{"issue":"3","key":"19_CR3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/MNET.011.2000508","volume":"35","author":"C Benza\u00efd","year":"2021","unstructured":"Benza\u00efd, C., Taleb, T., Farooqi, M.Z.: Trust in 5G and beyond networks. IEEE Netw. 35(3), 212\u2013222 (2021)","journal-title":"IEEE Netw."},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.future.2018.05.061","volume":"109","author":"FH Rahman","year":"2020","unstructured":"Rahman, F.H., Au, T.-W., Newaz, S.S., Suhaili, W.S., Lee, G.M.: Find my trustworthy fogs: a fuzzy-based trust evaluation framework. Futur. Gener. Comput. Syst. 109, 562\u2013572 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"24","key":"19_CR5","doi-asserted-by":"publisher","first-page":"9905","DOI":"10.3390\/s22249905","volume":"22","author":"S Uslu","year":"2022","unstructured":"Uslu, S., Kaur, D., Durresi, M., Durresi, A.: Trustability for resilient internet of things services on 5G multiple access edge cloud computing. Sensors 22(24), 9905 (2022)","journal-title":"Sensors"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Cai, H., Li, Z., Tian, J.: A new trust evaluation model based on cloud theory in e-commerce environment. In: 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011, pp. 139\u2013142 (2011)","DOI":"10.1109\/IPTC.2011.42"},{"key":"19_CR7","unstructured":"Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: Proceedings IEEE\/WIC International Conference on Web Intelligence (WI 2003), 2003, pp. 372\u2013378 (2003)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, P., Gu, X., Zhang, J., Fei, M.: A priori trust inference with context-aware stereotypical deep learning. Knowl.-Based Syst. 88, 97\u2013106 (2015). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S095070511500307X","DOI":"10.1016\/j.knosys.2015.08.003"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yu, F.R., Yang, R.: A machine learning approach for software-defined vehicular ad hoc networks with trust management. In: 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1\u20136 (2018)","DOI":"10.1109\/GLOCOM.2018.8647426"},{"issue":"1","key":"19_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","volume":"4","author":"U Jayasinghe","year":"2019","unstructured":"Jayasinghe, U., Lee, G.M., Um, T.-W., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4(1), 39\u201352 (2019)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"19_CR11","doi-asserted-by":"publisher","unstructured":"Braga, D.D.S., Niemann, M., Hellingrath, B., Neto, F.B.D.L.: Survey on computational trust and reputation models. ACM Comput. Surv. 51(5) (2018). https:\/\/doi.org\/10.1145\/3236008","DOI":"10.1145\/3236008"},{"issue":"6","key":"19_CR12","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/THMS.2018.2874188","volume":"49","author":"W-L Hu","year":"2019","unstructured":"Hu, W.-L., Akash, K., Reid, T., Jain, N.: Computational modeling of the dynamics of human trust during human-machine interactions. IEEE Trans. Hum.-Mach. Syst. 49(6), 485\u2013497 (2019)","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Zolfaghar, K. Aghaie, A.: Evolution of trust networks in social web applications using supervised learning. Procedia CS 3, 833\u2013839 (2011)","DOI":"10.1016\/j.procs.2010.12.137"},{"key":"19_CR14","unstructured":"Kumar, S., Shah, N.: False information on web and social media: a survey (2018)"},{"issue":"2","key":"19_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 1\u201340 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"19_CR16","unstructured":"Jantzen, J.: Tutorial on fuzzy logic, Technical University of Denmark, Dept. of Automation, Technical report (1998)"},{"issue":"4","key":"19_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/2.53","volume":"21","author":"LA Zadeh","year":"1988","unstructured":"Zadeh, L.A.: Fuzzy logic. Computer 21(4), 83\u201393 (1988)","journal-title":"Computer"},{"issue":"2","key":"19_CR18","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","volume":"20","author":"C-C Lee","year":"1990","unstructured":"Lee, C.-C.: Fuzzy logic in control systems: fuzzy logic controller. i. IEEE Trans. Syst. Man Cybern. 20(2), 404\u2013418 (1990)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"2","key":"19_CR19","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","volume":"20","author":"CC Lee","year":"1990","unstructured":"Lee, C.C.: Fuzzy logic in control systems: fuzzy logic controller. i. IEEE Trans. Syst. Man Cybern. 20(2), 404\u2013418 (1990)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Mendel, J.M.: Fuzzy logic systems for engineering: a tutorial. Proc. IEEE 83(3), 345\u2013377 (1995)","DOI":"10.1109\/5.364485"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Networked-based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40978-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T05:03:47Z","timestamp":1692767027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40978-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031409776","9783031409783"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40978-3_19","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai University","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}