Showing 1,701 - 1,720 results of 2,695 for search '(((pinnau OR sspingau) OR pinge) OR ((mink OR ((pink OR sink) OR link)) OR (ping OR peng)))', query time: 0.20s Refine Results
  1. 1701
  2. 1702

    Distributed hierarchical control of AC microgrid operating in grid-connected, islanded and their transition modes by Hou, Xiaochao, Sun, Yao, Lu, Jinghang, Zhang, Xin, Koh, Leong Hai, Su, Mei, Guerrero, Josep M.

    Published 2019
    “…In addition, stability analysis is added to facilitate the control parameter designs, and substantial simulation cases are provided to validate the control feasibility, link-failure-resiliency, and plug-and-play capability.…”
    Get full text
    Get full text
    Journal Article
  3. 1703
  4. 1704

    Oct4 switches partnering from Sox2 to Sox17 to reinterpret the enhancer code and specify endoderm by Ng, Calista Keow Leng, Herath, Wishva, Lili, Sun, Hutchins, Andrew P, Robson, Paul, Kolatkar, Prasanna R, Stanton, Lawrence W, Aksoy, Irene, Jauch, Ralf, Chen, Jiaxuan, Dyla, Mateusz, Divakar, Ushashree, Bogu, Gireesh K, Teo, Roy

    Published 2015
    “…This work provides insights in understanding cell fate transcriptional regulation by highlighting the direct link between the DNA sequence of an enhancer and a developmental outcome.…”
    Get full text
    Get full text
    Journal Article
  5. 1705
  6. 1706

    Human comfort in indoor environment : a review on assessment criteria, data collection and data analysis methods by Song, Ying, Mao, Fubing, Liu, Qing

    Published 2020
    “…Occupants' comfort perception about the indoor environment is closely linked to their health, wellbeing and productivity. …”
    Get full text
    Journal Article
  7. 1707
  8. 1708
  9. 1709

    Efficient public key encryption with equality test in the standard model by Zhang, Kai, Chen, Jie, Lee, Hyung Tae, Qian, Haifeng, Wang, Huaxiong

    Published 2020
    “…Then, to prevent adaptive chosen ciphertext attacks (CCA2), we give a link between them by adapting the technique which was originally proposed for identity-based encryption and previously exploited to design efficient CCA2-secure PKE schemes. …”
    Get full text
    Journal Article
  10. 1710
  11. 1711
  12. 1712
  13. 1713
  14. 1714
  15. 1715
  16. 1716
  17. 1717
  18. 1718
  19. 1719
  20. 1720