Skip to main content

Table 10 Compute \( a\ \mathrm{mapping}\ {\mathbb{C}}_M:X\to R,\mathrm{by}\ {\mathbb{C}}_M(x)={\sum}_{\left(i,j\right)\in {I}^2}\beta (x)\left(i,j\right), \)

From: Optimal alternative for suitability of S-boxes to image encryption based on m-polar fuzzy soft set decision-making criterion

\( \hat{\mathbb{C}} \)

\( \hat{\mathbb{C}}\left({x}_1\right) \)

\( \hat{\mathbb{C}}\left({x}_2\right) \)

\( \hat{\mathbb{C}}\left({x}_3\right) \)

\( \hat{\mathbb{C}}\left({x}_4\right) \)

\( \hat{\mathbb{C}}\left({x}_5\right) \)

(i1, j1)

60

60

60

60

60

(i1, j2)

60

60

60

60

60

(i1, j3)

60

60

60

60

60

(i2, j1)

60

60

60

60

60

(i2, j2)

0.1776

0.08208

0.0892

0.0632

0.083

(i2, j3)

60

60

60

60

60

(i3, j1)

60

60

60

60

60

(i3, j2)

60

60

60

60

60

(i3, j3)

60

60

60

60

60

M

120.1776

120.0

120.0

60

60