Research Article

Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques

Figure 13

Proposed algorithm chart of PSNR vs. runtime in seconds.