Figures & data
FIGURE 1 ANFIS Architecture (Jang Citation1993).
![FIGURE 1 ANFIS Architecture (Jang Citation1993).](/cms/asset/559185d9-f62c-46f6-b735-67d5229b9f91/uaai_a_1051894_f0001_b.gif)
TABLE 1 Utilized Features for Trust Prediction
FIGURE 3 Confusion matrix (Han, Kamber, and Pei Citation2011).
![FIGURE 3 Confusion matrix (Han, Kamber, and Pei Citation2011).](/cms/asset/1b4c9266-6ac0-4cde-ba1c-cfb388619dfe/uaai_a_1051894_f0003_b.gif)
FIGURE 4 Schema of holdout method (Han, Kamber, and Pei Citation2011).
![FIGURE 4 Schema of holdout method (Han, Kamber, and Pei Citation2011).](/cms/asset/5df4f642-bcce-49bd-84c5-7fafae89f542/uaai_a_1051894_f0004_b.gif)
TABLE 2 Statistics of the Employed Dataset
TABLE 3 Performance Evaluation of Different Techniques