Skip to main content

Table 10 Compute \( a\ \mathrm{mapping}\ {\mathbb{C}}_M:X\to R,\mathrm{by}\ {\mathbb{C}}_M(x)={\sum}_{\left(i,j\right)\in {I}^2}\beta (x)\left(i,j\right), \)

From: Optimal alternative for suitability of S-boxes to image encryption based on m-polar fuzzy soft set decision-making criterion

\( \hat{\mathbb{C}} \)\( \hat{\mathbb{C}}\left({x}_1\right) \)\( \hat{\mathbb{C}}\left({x}_2\right) \)\( \hat{\mathbb{C}}\left({x}_3\right) \)\( \hat{\mathbb{C}}\left({x}_4\right) \)\( \hat{\mathbb{C}}\left({x}_5\right) \)
(i1, j1)6060606060
(i1, j2)6060606060
(i1, j3)6060606060
(i2, j1)6060606060
(i2, j2)0.17760.082080.08920.06320.083
(i2, j3)6060606060
(i3, j1)6060606060
(i3, j2)6060606060
(i3, j3)6060606060
M120.1776120.0120.06060