Author of the publication

DE MERVLs are Enriched Around Two-Cell-Specific Genes During Zygotic Genome Activation in Mouse.

, , , and . SMC, page 3399-3404. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions., , , and . Future Gener. Comput. Syst., (2019)Optimized byzantine fault tolerant algorithm for improving performance and security with trust values., , , and . IET Blockchain, 4 (1): 1-17 (March 2024)An Adaptive Traffic Signal Control Scheme Based on Back-pressure with Global Information., , , , and . J. Inf. Process., (2021)Source delay in mobile ad hoc networks., , , and . Ad Hoc Networks, (2015)Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption., , , and . IEEE Syst. J., 15 (4): 5233-5244 (2021)Leakage-Suppressed Range Query Scheme for Structured Data in IoT., , , and . IEEE Syst. J., 16 (3): 3531-3542 (2022)AES-128 under HHL algorithm., , , and . Quantum Inf. Comput., 22 (3&4): 209-240 (2022)End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach., , , , and . Ad Hoc Sens. Wirel. Networks, 29 (1-4): 265-285 (2015)Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing., , , , , , and . J. Cloud Comput., 12 (1): 174 (December 2023)Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s)., , , and . J. Inf. Secur. Appl., (2019)