{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T08:51:11Z","timestamp":1745398271742,"version":"3.38.0"},"reference-count":28,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JHS"],"published-print":{"date-parts":[[2024,5,10]]},"abstract":"<jats:p>In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The Logical Trust (LT) is one of trust computing concepts. In this paper, we design a Fuzzy-based System for Decision of Logical Trust (FSDLT). We implement two models: FSDLTM1 and FSDLTM2. The FSDLTM1 considers three input parameters: Belief (Be), Experience (Ep), Rationality (Ra) and the output parameter is LT. In FSDLTM2, we consider Reliability (Re) as a new parameter. We evaluated the implemented models by computer simulations. The simulation results show that when Be, Ep, Ra and Re are increasing, the LT is increased. For FSDLTM1, when Ep value is 0.9, all LT values are greater than 0.5. While for FSDLTM2, in case when Be is 0.9, for all values of Ra and Re, when Ep is 0.5 and 0.9, all LT values are higher than 0.5. This shows that the person or device is trustworthy. The FSDLTM2 is more complex than FSALTM1 but it makes a better decision for LT by considering four input parameters.<\/jats:p>","DOI":"10.3233\/jhs-230189","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T15:58:57Z","timestamp":1703260737000},"page":"279-295","source":"Crossref","is-referenced-by-count":2,"title":["A comparison study of two implemented fuzzy-based models for decision of logical trust"],"prefix":"10.1177","volume":"30","author":[{"given":"Shunya","family":"Higashi","sequence":"first","affiliation":[{"name":"Graduate School of Engineering, Fukuoka Institute of Technology, 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"given":"Phudit","family":"Ampririt","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Fukuoka Institute of Technology, 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"given":"Ermioni","family":"Qafzezi","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]}],"member":"179","reference":[{"key":"10.3233\/JHS-230189_ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2014.6779515"},{"key":"10.3233\/JHS-230189_ref2","doi-asserted-by":"publisher","DOI":"10.1109\/iCoMET57998.2023.10099351"},{"issue":"3","key":"10.3233\/JHS-230189_ref3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/MNET.011.2000508","article-title":"Trust in 5G and beyond networks","volume":"35","author":"Benza\u00efd","year":"2021","journal-title":"IEEE Network"},{"key":"10.3233\/JHS-230189_ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3236008"},{"key":"10.3233\/JHS-230189_ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2011.42"},{"issue":"2","key":"10.3233\/JHS-230189_ref6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","article-title":"A survey on trust modeling","volume":"48","author":"Cho","year":"2015","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.3233\/JHS-230189_ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2009.5277344"},{"issue":"6","key":"10.3233\/JHS-230189_ref8","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/THMS.2018.2874188","article-title":"Computational modeling of the dynamics of human trust during human-machine interactions","volume":"49","author":"Hu","year":"2019","journal-title":"IEEE Transactions on Human\u2013Machine Systems"},{"key":"10.3233\/JHS-230189_ref9","doi-asserted-by":"publisher","first-page":"31622","DOI":"10.1109\/ACCESS.2020.2972968","article-title":"Context-aware trust and reputation model for fog-based IoT","volume":"8","author":"Hussain","year":"2020","journal-title":"IEEE Access"},{"issue":"1","key":"10.3233\/JHS-230189_ref11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","article-title":"Machine learning based trust computational model for IoT services","volume":"4","author":"Jayasinghe","year":"2019","journal-title":"IEEE Transactions on Sustainable Computing"},{"issue":"2","key":"10.3233\/JHS-230189_ref13","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","article-title":"Fuzzy logic in control systems: Fuzzy logic controller. I","volume":"20","author":"Lee","year":"1990","journal-title":"IEEE Transactions on systems, man, and cybernetics"},{"issue":"3","key":"10.3233\/JHS-230189_ref14","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/5.364485","article-title":"Fuzzy logic systems for engineering: A tutorial","volume":"83","author":"Mendel","year":"1995","journal-title":"Proceedings of the IEEE"},{"key":"10.3233\/JHS-230189_ref15","doi-asserted-by":"crossref","unstructured":"K.W.\u00a0Nafi, T.S.\u00a0Kar, M.A.\u00a0Hossain and M.\u00a0Hashem, A fuzzy logic based certain trust model for e-commerce, in: 2013 International Conference on Informatics, Electronics and Vision (ICIEV), IEEE, 2013, pp.\u00a01\u20136.","DOI":"10.1109\/ICIEV.2013.6572693"},{"key":"10.3233\/JHS-230189_ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2005.4"},{"key":"10.3233\/JHS-230189_ref17","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.future.2018.05.061","article-title":"Find my trustworthy fogs: A fuzzy-based trust evaluation framework","volume":"109","author":"Rahman","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/JHS-230189_ref18","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1007\/s11276-019-02106-3","article-title":"A trust computed framework for IoT devices and fog computing environment","volume":"26","author":"Rathee","year":"2020","journal-title":"Wireless Networks"},{"key":"10.3233\/JHS-230189_ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC56507.2023.10084093"},{"key":"10.3233\/JHS-230189_ref20","doi-asserted-by":"crossref","unstructured":"C.D.\u00a0Schultz, A trust framework model for situational contexts, in: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, 2006, pp.\u00a01\u20137.","DOI":"10.1145\/1501434.1501494"},{"key":"10.3233\/JHS-230189_ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30141-7_6"},{"key":"10.3233\/JHS-230189_ref22","doi-asserted-by":"publisher","first-page":"106743","DOI":"10.1109\/ACCESS.2021.3100767","article-title":"On the trust and trust modeling for the future fully-connected digital world: A comprehensive study","volume":"9","author":"Ting","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JHS-230189_ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s22249905"},{"key":"10.3233\/JHS-230189_ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.65"},{"key":"10.3233\/JHS-230189_ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2003.1241218"},{"key":"10.3233\/JHS-230189_ref26","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Wu, Research of trust degree evaluation for C2C e-commerce based on fuzzy neural network, in: 2010 2nd International Conference on e-Business and Information System Security, IEEE, 2010, pp.\u00a01\u20134.","DOI":"10.1109\/EBISS.2010.5473508"},{"issue":"4","key":"10.3233\/JHS-230189_ref27","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/2.53","article-title":"Fuzzy logic","volume":"21","author":"Zadeh","year":"1988","journal-title":"Computer"},{"key":"10.3233\/JHS-230189_ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647426"},{"key":"10.3233\/JHS-230189_ref29","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.knosys.2015.08.003","article-title":"A priori trust inference with context-aware stereotypical deep learning","volume":"88","author":"Zhou","year":"2015","journal-title":"Knowledge-Based Systems"},{"key":"10.3233\/JHS-230189_ref30","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.procs.2010.12.137","article-title":"Evolution of trust networks in social web applications using supervised learning","volume":"3","author":"Zolfaghar","year":"2011","journal-title":"Procedia CS"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JHS-230189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:32:12Z","timestamp":1741667532000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JHS-230189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,10]]},"references-count":28,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jhs-230189","relation":{},"ISSN":["1875-8940","0926-6801"],"issn-type":[{"type":"electronic","value":"1875-8940"},{"type":"print","value":"0926-6801"}],"subject":[],"published":{"date-parts":[[2024,5,10]]}}}