Research Article
Application of Fuzzy DEMATEL in Risks Evaluation of Knowledge-Based Networks
Table 3
The assessment data of the risk types.
| ā | C1 | C2 | C3 | C4 | C5 | C6 | C7 | C8 |
| C1 | No | VH | VL | H | H | VH | L | L | C2 | H | No | VL | VL | VL | H | VL | No | C3 | No | L | No | VH | H | H | No | H | C4 | L | No | VL | No | VH | H | VL | L | C5 | No | H | L | VH | No | H | No | VL | C6 | VL | L | VL | L | L | No | VL | VL | C7 | H | VL | VL | VH | VL | L | No | H | C8 | H | L | H | L | No | L | L | No |
|
|