Next Article in Journal
Detecting the Void behind the Tunnel Lining by Impact-Echo Methods with Different Signal Analysis Approaches
Next Article in Special Issue
Control-Flow Integrity: Attacks and Protections
Previous Article in Journal
Intelligent Human–UAV Interaction System with Joint Cross-Validation over Action–Gesture Recognition and Scene Understanding
Previous Article in Special Issue
DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network
 
 
Article

Article Versions Notes

Appl. Sci. 2019, 9(16), 3279; https://doi.org/10.3390/app9163279
Action Date Notes Link
article xml file uploaded 9 August 2019 16:59 CEST Original file -
article pdf uploaded. 9 August 2019 16:59 CEST Version of Record https://www.mdpi.com/2076-3417/9/16/3279/pdf-vor
article xml file uploaded 14 August 2019 11:09 CEST Update -
article xml uploaded. 14 August 2019 11:09 CEST Update https://www.mdpi.com/2076-3417/9/16/3279/xml
article pdf uploaded. 14 August 2019 11:09 CEST Updated version of record https://www.mdpi.com/2076-3417/9/16/3279/pdf
article html file updated 14 August 2019 11:10 CEST Original file -
article html file updated 27 August 2019 05:59 CEST Update -
article html file updated 13 February 2020 08:48 CET Update -
article html file updated 20 July 2022 05:28 CEST Update https://www.mdpi.com/2076-3417/9/16/3279/html
Back to TopTop