[1. M. Ceci, D. Malerba, 2007. Classifying Web documents in a hierarchy of categories:a comprehensive study. Journal of Intelligent Information System, 28(1): 37-78.10.1007/s10844-006-0003-2]Search in Google Scholar
[2. H. X. Wang, S. Y. Wang, X. Wang, et al. 2014. Analysis of LFM signals and improvement of IFM system. Acta Armamentarii, 35(8): 1193-1199.]Search in Google Scholar
[3. M. A. Govoni, H. Li, J. A. Kosinski, 2013. Range-Doppler resolution of the linear-FM noise radar waveform. IEEE Transactions on Aerospace and Electronic Systems, 49(1): 658-664.10.1109/TAES.2013.6404130]Open DOISearch in Google Scholar
[4. J. H. Lu, X. Han, J. X. Li, 2016. Consensus-based distributed fusion estimator with communication bandwidth constraints. Control and Decision, 31(12): 2155-2162.]Search in Google Scholar
[5. M. Huang, L. T. Wang, H. C. Zhang, 2016. Face Recognition Based on Gabor Wavelet Transform and K-L Gaussian Riemannian Manifold Discriminant. Computer Engineering, 42(9): 208-213.]Search in Google Scholar
[6. H. Hao, 2013. Multi component LFM signal detection and parameter estimation based on EEMD-FRFT. Optik- International Journal for Light and Electron Optics, 124(23): 6093-6096.10.1016/j.ijleo.2013.04.104]Search in Google Scholar
[7. M. A. Govoni, H. Li, J. A. Kosinski, 2013. Range-Doppler resolution of the linear-FM noise radar waveform. IEEE Transactions on Aerospace and Electronic Systems, 49(1):658-664.10.1109/TAES.2013.6404130]Open DOISearch in Google Scholar
[8. Y. Y. Fu, M. Zhang, D. G., Feng et al. 2014. Attribute privacy preservation in social networks based on node anatomy. Journal of Software, 25(4): 768-780.]Search in Google Scholar
[9. D. G. Feng, M. Zhang, H. Li, 2014. Big data security and privacy protection. Chinese Journal of Computers, 37(1): 246-258. ]Search in Google Scholar
[10. J. Song, G. Y. Xu, R. P. Yao, 2016. Anonymized data privacy protection method based on differential privacy. Journal of Computer Applications, 36(10): 2753-2757.]Search in Google Scholar
[11. C. Hazay, K. Nissim, 2012. Efficient set operations in the presence of malicious adversaries. Journal of Cryptology, 25(3):383-433. 10.1007/s00145-011-9098-x]Open DOISearch in Google Scholar
[12. Y. Pan, Y. Tang, H. Liu, 2012. Access control in very loosely structured data model using relational databases. Acta Electronica Sinica, 240(3): 600-606.]Search in Google Scholar
[13. A. Rahman, H. Muhammah, L. Sungyoung, et al. 2015. Rough set-based approaches for discretization: a compact reviews. Artificial Intelligence Review, 44(2): 235-263.10.1007/s10462-014-9426-2]Search in Google Scholar
[14. Y. H. Qian, H. Zhang, Y. Sang, et al. 2014. Multigranulation decision-theoretic rough sets. International Journal of Approximate Reasoning, 55(1): 225-237.10.1016/j.ijar.2013.03.004]Search in Google Scholar
[15. F. Xu, J. J. Ma, 2015. Improvement of Threshold RSA Signature Scheme Based on Chinese Remainder Theorem. JEIT, 37(10): 2495-2500.]Search in Google Scholar
[16. P. Curt, R. J. Thomas, S. Deming, 2012. A high-fidelity harmonic drive model. ASME J of Dynamic Systems, Measurement, and Control, 134(1): 457-461. 10.1115/1.4005041]Search in Google Scholar
[17. S. Ali, R. Ali, A. Iftikhar, 2017. Physico-chemical and microbiological assessment of some freshwater aquifers and associated diseases in district ghizer, gilgit-baltistan, Pakistan. Acta Scientifica Malaysia, 1(1): 08-12.10.26480/asm.01.2017.08.12]Search in Google Scholar
[18. Y. Pan, C. A. Yuan, W. J. Li, M. H. Cheng, 2016. Access Control Method for Supporting Update Operations in Dataspace. JEIT, 38(8): 1935-1941.]Search in Google Scholar
[19. M. J. Guo, Y. Huang, Z. Xie, 2013. A WebGIS Model Optimization Strategy under Multi-core Environment. Computer Engineering, 39(8): 15-19.]Search in Google Scholar
[20. Y. Huang, J. Paisley, Q. Lin, et al. 2014. Bayesian nonparametric dictionary learning for compressed sensing MRI. IEEE Transactions on Image Processing, 23(12): 5007-5019.10.1109/TIP.2014.236012225265609]Search in Google Scholar
[21. L. Shen, G. Sun, Q. Huang, et al. 2015. Multi-level discriminative dictionary learning with application to large scale image classification. IEEE Transactions on Image Processing, 24(10): 3109-3123.10.1109/TIP.2015.243854826080049]Search in Google Scholar
[22. L. Shen, G. Sun, Q. Huang, et al. 2015. Multi-level discriminative dictionary learning with application to large scale image classification. IEEE Transactions on Image Processing, 24(10): 3109-3123.10.1109/TIP.2015.2438548]Search in Google Scholar
[23. J. J. Thiagarajan, K. N. Ramamurthy, A. Spanias, 2015. Learning stable multilevel dictionaries for space representations. IEEE Transactions on Neural Networks & Learning Systems, 26(9): 1913-1926.10.1109/TNNLS.2014.236105225343771]Search in Google Scholar
[24. J. Z. Jiang, F. Zhou, 2013. Iterative design of two-dimensional critically sampled MDFT modulated filter banks. Signal Processing, 93(11): 3124-3132.10.1016/j.sigpro.2013.03.022]Search in Google Scholar
[25. N. Rajapakaha, A. Madanayake, Lt. 2014. Bruton, 2D spacetime wave-digital multi-fan filter banks for sig[10]Gao, W. and W. Wang, The fifth geometric-arithmetic index of bridge graph and carbon nanocones. Journal of Difference Equations and Applications, 2017. 23(1-2SI): p. 100-109.]Search in Google Scholar
[26. Gao, W., et al., Distance learning techniques for ontology similarity measuring and ontology mapping. Cluster Computing-The Journal of Networks Software Tools and Applications, 2017. 20(2SI): p. 959-968.nals consisting of multiple plane waves. Multidimensional Systems and Signal Processing, 25(1): 17-39.10.1007/s10586-017-0887-3]Search in Google Scholar
[27. H. Mahboubi, K. Moezzi, A. G. Aghdam, et al. 2014. Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors. IEEE Transactions on Industrial Informatics, 10(1): 163-174.10.1109/TII.2013.2280095]Open DOISearch in Google Scholar
[28. N.S.A. Sukor, N. Jarani, S.F.M. Fisal, 2017. Analysis of Passengers’ Access and Egress Characteristics to The Train Station. Engineering Heritage Journal, 1(2): 01-04.10.26480/gwk.02.2017.01.04]Search in Google Scholar
[29. S.C.A. Mana, M.M. Hanafiah, A.J.K. Chowdhury, 2017. Environmental characteristics of clay and clay-based minerals. Geology, Ecology, and Landscapes, 1(3): 155-161.10.1080/24749508.2017.1361128]Search in Google Scholar
[30. M. Bahmani, A. Noorzad, J. Hamedi, F. Sali, 2017. The role of bacillus pasteurii on the change of parameters of sands according to temperatur compresion and wind erosion resistance. Journal CleanWAS, 1(2): 1-5.10.26480/jcleanwas.02.2017.01.05]Search in Google Scholar
[31. N.A. Rahman, Z. Tarmudi, M. Rossdy, F.A. Muhiddin, 2017. Flood Mitigation Measres Using Intuitionistic Fuzzy Dematel Method. Malaysian Journal Geosciences, 1(2):01-05. 10.26480/mjg.02.2017.01.05]Search in Google Scholar
[32. R. Roslee, N. Simon, 2017. Rock Slopes Kinametic Analysis Along the Bundu Tuhan To Kundasang Highway, Sabah, Malaysia. Geological Behavior, 1(2):01-04.10.26480/gbr.02.2017.01.04]Search in Google Scholar