Research Article

Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques

Figure 10

Result obtained for house images.
(a)
(b)
(c)
(d)