Showing 1,201 - 1,220 results of 2,221 for search '(((pinene OR spinnae) OR (hinge OR (hing OR hiang))) OR ((pinga OR ping) OR link))', query time: 0.25s Refine Results
  1. 1201
  2. 1202

    Distributed hierarchical control of AC microgrid operating in grid-connected, islanded and their transition modes by Hou, Xiaochao, Sun, Yao, Lu, Jinghang, Zhang, Xin, Koh, Leong Hai, Su, Mei, Guerrero, Josep M.

    Published 2019
    “…In addition, stability analysis is added to facilitate the control parameter designs, and substantial simulation cases are provided to validate the control feasibility, link-failure-resiliency, and plug-and-play capability.…”
    Get full text
    Get full text
    Journal Article
  3. 1203
  4. 1204

    Oct4 switches partnering from Sox2 to Sox17 to reinterpret the enhancer code and specify endoderm by Ng, Calista Keow Leng, Herath, Wishva, Lili, Sun, Hutchins, Andrew P, Robson, Paul, Kolatkar, Prasanna R, Stanton, Lawrence W, Aksoy, Irene, Jauch, Ralf, Chen, Jiaxuan, Dyla, Mateusz, Divakar, Ushashree, Bogu, Gireesh K, Teo, Roy

    Published 2015
    “…This work provides insights in understanding cell fate transcriptional regulation by highlighting the direct link between the DNA sequence of an enhancer and a developmental outcome.…”
    Get full text
    Get full text
    Journal Article
  5. 1205
  6. 1206

    Human comfort in indoor environment : a review on assessment criteria, data collection and data analysis methods by Song, Ying, Mao, Fubing, Liu, Qing

    Published 2020
    “…Occupants' comfort perception about the indoor environment is closely linked to their health, wellbeing and productivity. …”
    Get full text
    Journal Article
  7. 1207
  8. 1208
  9. 1209

    Efficient public key encryption with equality test in the standard model by Zhang, Kai, Chen, Jie, Lee, Hyung Tae, Qian, Haifeng, Wang, Huaxiong

    Published 2020
    “…Then, to prevent adaptive chosen ciphertext attacks (CCA2), we give a link between them by adapting the technique which was originally proposed for identity-based encryption and previously exploited to design efficient CCA2-secure PKE schemes. …”
    Get full text
    Journal Article
  10. 1210
  11. 1211
  12. 1212
  13. 1213
  14. 1214
  15. 1215
  16. 1216
  17. 1217
  18. 1218
  19. 1219
  20. 1220