Next Article in Journal
Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
Previous Article in Journal
A Recommendation System for Trigger–Action Programming Rules via Graph Contrastive Learning
 
 
Article

Article Versions Notes

Sensors 2024, 24(18), 6152; https://doi.org/10.3390/s24186152
Action Date Notes Link
article xml file uploaded 23 September 2024 15:54 CEST Original file -
article xml uploaded. 23 September 2024 15:54 CEST Update -
article pdf uploaded. 23 September 2024 15:54 CEST Version of Record https://www.mdpi.com/1424-8220/24/18/6152/pdf-vor
article html file updated 23 September 2024 15:56 CEST Original file -
article xml file uploaded 24 September 2024 08:29 CEST Update -
article xml uploaded. 24 September 2024 08:29 CEST Update https://www.mdpi.com/1424-8220/24/18/6152/xml
article pdf uploaded. 24 September 2024 08:29 CEST Updated version of record https://www.mdpi.com/1424-8220/24/18/6152/pdf
article html file updated 24 September 2024 08:31 CEST Update https://www.mdpi.com/1424-8220/24/18/6152/html
Back to TopTop