Search alternatives:
pinecone » pinene (Expand Search)
Showing 1,181 - 1,200 results of 2,184 for search '(((pinecone OR pinnae) OR ((hinges OR cchinge) OR hing)) OR ((pina OR ping) OR link))', query time: 0.16s Refine Results
  1. 1181
  2. 1182

    Distributed hierarchical control of AC microgrid operating in grid-connected, islanded and their transition modes by Hou, Xiaochao, Sun, Yao, Lu, Jinghang, Zhang, Xin, Koh, Leong Hai, Su, Mei, Guerrero, Josep M.

    Published 2019
    “…In addition, stability analysis is added to facilitate the control parameter designs, and substantial simulation cases are provided to validate the control feasibility, link-failure-resiliency, and plug-and-play capability.…”
    Get full text
    Get full text
    Journal Article
  3. 1183
  4. 1184

    Oct4 switches partnering from Sox2 to Sox17 to reinterpret the enhancer code and specify endoderm by Ng, Calista Keow Leng, Herath, Wishva, Lili, Sun, Hutchins, Andrew P, Robson, Paul, Kolatkar, Prasanna R, Stanton, Lawrence W, Aksoy, Irene, Jauch, Ralf, Chen, Jiaxuan, Dyla, Mateusz, Divakar, Ushashree, Bogu, Gireesh K, Teo, Roy

    Published 2015
    “…This work provides insights in understanding cell fate transcriptional regulation by highlighting the direct link between the DNA sequence of an enhancer and a developmental outcome.…”
    Get full text
    Get full text
    Journal Article
  5. 1185
  6. 1186

    Human comfort in indoor environment : a review on assessment criteria, data collection and data analysis methods by Song, Ying, Mao, Fubing, Liu, Qing

    Published 2020
    “…Occupants' comfort perception about the indoor environment is closely linked to their health, wellbeing and productivity. …”
    Get full text
    Journal Article
  7. 1187
  8. 1188
  9. 1189

    Efficient public key encryption with equality test in the standard model by Zhang, Kai, Chen, Jie, Lee, Hyung Tae, Qian, Haifeng, Wang, Huaxiong

    Published 2020
    “…Then, to prevent adaptive chosen ciphertext attacks (CCA2), we give a link between them by adapting the technique which was originally proposed for identity-based encryption and previously exploited to design efficient CCA2-secure PKE schemes. …”
    Get full text
    Journal Article
  10. 1190
  11. 1191
  12. 1192
  13. 1193
  14. 1194
  15. 1195
  16. 1196
  17. 1197
  18. 1198
  19. 1199
  20. 1200