Skip to main content

Table 5 A normalized decision matrix

From: A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

  C1 C2 C3 C4 C5 C6 C7
A1 0.407,0.640,0.869 0.520,0.742,0.947 0.570,0.785,0.955 0.542,0.758,0.943 0.575,0.792,0.959 0.636,0.842,1.000 0.595,0.814,0.991
A2 0.556,0.790,1.000 0.591,0.809,0.987 0.525,0.749,0.951 0.612,0.833,1.000 0.629,0.842,1.000 0.566,0.772,0.939 0.568,0.795,0.977
A3 0.565,0.794,0.991 0.609,0.827,1.000 0.596,0.816,1.000 0.604,0.815,0.982 0.611,0.824,1.000 0.561,0.768,0.934 0.595,0.814,1.000
A4 0.537,0.771,0.972 0.573,0.787,0.960 0.534,0.753,0.942 0.515,0.731,0.921 0.557,0.769,0.955 0.513,0.732,0.930 0.514,0.741,0.936
A5 0.547,0.780,0.995 0.556,0.773,0.951 0.578,0.798,0.982 0.533,0.749,0.938 0.529,0.756,0.959 0.496,0.715,0.912 0.495,0.723,0.932