Skip to main content

Table 7 Mapping M : X → R,by \( {\mathbb{C}}_M(x)={\sum}_{\left(i,j\right)\in {I}^2}\beta (x)\left(i,j\right) \)

From: Optimal alternative for suitability of S-boxes to image encryption based on m-polar fuzzy soft set decision-making criterion

\( \hat{\mathbb{C}} \)\( \hat{\mathbb{C}}\left({x}_1\right) \)\( \hat{\mathbb{C}}\left({x}_2\right) \)\( \hat{\mathbb{C}}\left({x}_3\right) \)\( \hat{\mathbb{C}}\left({x}_4\right) \)\( \hat{\mathbb{C}}\left({x}_5\right) \)
(i1, j1)6060606060
(i1, j2)0.13680.0196606060
(i1, j3)6060606060
(i2, j1)0.15760.034080.08920.06320.083
(i2, j2)0.11680.01960.00320.02450.0022
(i2, j3)0.15760.117360.08920.06320.083
(i3, j1)6060606060
(i3, j2)0.13680.01960.00440.02450.0224
(i3, j3)6060606060
M120.56886060600