Showing 881 - 900 results of 2,014 for search '(((spike OR pinnae) OR ((hinge OR hiange) OR hing)) OR ((spinga OR pin) OR link))', query time: 0.18s Refine Results
  1. 881

    Distributed hierarchical control of AC microgrid operating in grid-connected, islanded and their transition modes by Hou, Xiaochao, Sun, Yao, Lu, Jinghang, Zhang, Xin, Koh, Leong Hai, Su, Mei, Guerrero, Josep M.

    Published 2019
    “…In addition, stability analysis is added to facilitate the control parameter designs, and substantial simulation cases are provided to validate the control feasibility, link-failure-resiliency, and plug-and-play capability.…”
    Get full text
    Get full text
    Journal Article
  2. 882
  3. 883

    Oct4 switches partnering from Sox2 to Sox17 to reinterpret the enhancer code and specify endoderm by Ng, Calista Keow Leng, Herath, Wishva, Lili, Sun, Hutchins, Andrew P, Robson, Paul, Kolatkar, Prasanna R, Stanton, Lawrence W, Aksoy, Irene, Jauch, Ralf, Chen, Jiaxuan, Dyla, Mateusz, Divakar, Ushashree, Bogu, Gireesh K, Teo, Roy

    Published 2015
    “…This work provides insights in understanding cell fate transcriptional regulation by highlighting the direct link between the DNA sequence of an enhancer and a developmental outcome.…”
    Get full text
    Get full text
    Journal Article
  4. 884
  5. 885

    Human comfort in indoor environment : a review on assessment criteria, data collection and data analysis methods by Song, Ying, Mao, Fubing, Liu, Qing

    Published 2020
    “…Occupants' comfort perception about the indoor environment is closely linked to their health, wellbeing and productivity. …”
    Get full text
    Journal Article
  6. 886
  7. 887
  8. 888

    Efficient public key encryption with equality test in the standard model by Zhang, Kai, Chen, Jie, Lee, Hyung Tae, Qian, Haifeng, Wang, Huaxiong

    Published 2020
    “…Then, to prevent adaptive chosen ciphertext attacks (CCA2), we give a link between them by adapting the technique which was originally proposed for identity-based encryption and previously exploited to design efficient CCA2-secure PKE schemes. …”
    Get full text
    Journal Article
  9. 889
  10. 890
  11. 891
  12. 892
  13. 893
  14. 894
  15. 895
  16. 896
  17. 897
  18. 898
  19. 899
  20. 900