Reference Hub1
Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems

Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems

Fateh Boutekkouk
Copyright: © 2021 |Volume: 12 |Issue: 3 |Pages: 20
ISSN: 1942-3594|EISSN: 1942-3608|EISBN13: 9781799860785|DOI: 10.4018/IJAEC.2021070101
Cite Article Cite Article

MLA

Boutekkouk, Fateh. "Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems." IJAEC vol.12, no.3 2021: pp.1-20. http://doi.org/10.4018/IJAEC.2021070101

APA

Boutekkouk, F. (2021). Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems. International Journal of Applied Evolutionary Computation (IJAEC), 12(3), 1-20. http://doi.org/10.4018/IJAEC.2021070101

Chicago

Boutekkouk, Fateh. "Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems," International Journal of Applied Evolutionary Computation (IJAEC) 12, no.3: 1-20. http://doi.org/10.4018/IJAEC.2021070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this work, the authors present their solution to select the best operating system for an efficient security-aware design of embedded systems. This problem is formulated as a MCDM problem and solved using a hybrid approach combining fuzzy AHP and fuzzy VIKOR. This combination enables the authors to take profit of both methods. From AHP, they exploited the hierarchy and the pairwise comparison between criteria that leads to finding the importance (weight) of each criteria more consistently. On the other hand, from the VIKOR method, they leverage its power to compromise between conflictual criteria. Since they are dealing with unprecise and subjective advises, they opt for the fuzzy versions of the AHP and VIKOR methods dealing with triangular fuzzy numbers. They used fuzzy AHP to calculate weights of criteria which are served later as inputs for the fuzzy VIKOR method. The outcome of this work is to assist embedded designers to select the most appropriate embedded OS for efficient design of secure embedded systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.