Showing 1,101 - 1,120 results of 2,206 for search '(((spine OR pinnae) OR (shinge OR ((hing OR ching) OR hiang))) OR ((spinga OR pin) OR link))', query time: 0.21s Refine Results
  1. 1101

    Distributed hierarchical control of AC microgrid operating in grid-connected, islanded and their transition modes by Hou, Xiaochao, Sun, Yao, Lu, Jinghang, Zhang, Xin, Koh, Leong Hai, Su, Mei, Guerrero, Josep M.

    Published 2019
    “…In addition, stability analysis is added to facilitate the control parameter designs, and substantial simulation cases are provided to validate the control feasibility, link-failure-resiliency, and plug-and-play capability.…”
    Get full text
    Get full text
    Journal Article
  2. 1102
  3. 1103

    Oct4 switches partnering from Sox2 to Sox17 to reinterpret the enhancer code and specify endoderm by Ng, Calista Keow Leng, Herath, Wishva, Lili, Sun, Hutchins, Andrew P, Robson, Paul, Kolatkar, Prasanna R, Stanton, Lawrence W, Aksoy, Irene, Jauch, Ralf, Chen, Jiaxuan, Dyla, Mateusz, Divakar, Ushashree, Bogu, Gireesh K, Teo, Roy

    Published 2015
    “…This work provides insights in understanding cell fate transcriptional regulation by highlighting the direct link between the DNA sequence of an enhancer and a developmental outcome.…”
    Get full text
    Get full text
    Journal Article
  4. 1104
  5. 1105

    Human comfort in indoor environment : a review on assessment criteria, data collection and data analysis methods by Song, Ying, Mao, Fubing, Liu, Qing

    Published 2020
    “…Occupants' comfort perception about the indoor environment is closely linked to their health, wellbeing and productivity. …”
    Get full text
    Journal Article
  6. 1106
  7. 1107
  8. 1108

    Efficient public key encryption with equality test in the standard model by Zhang, Kai, Chen, Jie, Lee, Hyung Tae, Qian, Haifeng, Wang, Huaxiong

    Published 2020
    “…Then, to prevent adaptive chosen ciphertext attacks (CCA2), we give a link between them by adapting the technique which was originally proposed for identity-based encryption and previously exploited to design efficient CCA2-secure PKE schemes. …”
    Get full text
    Journal Article
  9. 1109
  10. 1110
  11. 1111
  12. 1112
  13. 1113
  14. 1114
  15. 1115
  16. 1116
  17. 1117
  18. 1118
  19. 1119
  20. 1120