Research Article
A Novel Enhanced Supplier Selection Method Used for Handling Hesitant Fuzzy Linguistic Information
Table 6
Summarized evaluation values of the network security system by the proposed method.
| ā | Alternative 1 | Alternative 2 | Alternative 3 | Alternative 4 |
| | 0.857 | 0.517 | 0.640 | 0.607 | | 0.963 | 0.561 | 0.733 | 0.699 | | 1.070 | 0.606 | 0.827 | 0.792 | | 1.174 | 0.655 | 0.928 | 0.896 | | 1.307 | 0.707 | 1.041 | 1.017 |
|
|