Skip to main content

Table 5 A normalized decision matrix

From: A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

 

C1

C2

C3

C4

C5

C6

C7

A1

0.407,0.640,0.869

0.520,0.742,0.947

0.570,0.785,0.955

0.542,0.758,0.943

0.575,0.792,0.959

0.636,0.842,1.000

0.595,0.814,0.991

A2

0.556,0.790,1.000

0.591,0.809,0.987

0.525,0.749,0.951

0.612,0.833,1.000

0.629,0.842,1.000

0.566,0.772,0.939

0.568,0.795,0.977

A3

0.565,0.794,0.991

0.609,0.827,1.000

0.596,0.816,1.000

0.604,0.815,0.982

0.611,0.824,1.000

0.561,0.768,0.934

0.595,0.814,1.000

A4

0.537,0.771,0.972

0.573,0.787,0.960

0.534,0.753,0.942

0.515,0.731,0.921

0.557,0.769,0.955

0.513,0.732,0.930

0.514,0.741,0.936

A5

0.547,0.780,0.995

0.556,0.773,0.951

0.578,0.798,0.982

0.533,0.749,0.938

0.529,0.756,0.959

0.496,0.715,0.912

0.495,0.723,0.932