Next Article in Journal
ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files
Next Article in Special Issue
Internet of Things and Its Applications: A Comprehensive Survey
Previous Article in Journal
The Use of a Hidden Mixture Transition Distribution Model in Clustering Few but Long Continuous Sequences: An Illustration with Cognitive Skills Data
Previous Article in Special Issue
Truncated-Exponential-Based Appell-Type Changhee Polynomials
 
 
Article

Article Versions Notes

Symmetry 2020, 12(10), 1619; https://doi.org/10.3390/sym12101619
Action Date Notes Link
article xml file uploaded 30 September 2020 11:48 CEST Original file -
article xml uploaded. 30 September 2020 11:48 CEST Update https://www.mdpi.com/2073-8994/12/10/1619/xml
article pdf uploaded. 30 September 2020 11:48 CEST Version of Record https://www.mdpi.com/2073-8994/12/10/1619/pdf
article html file updated 30 September 2020 11:50 CEST Original file -
article html file updated 22 July 2022 09:11 CEST Update https://www.mdpi.com/2073-8994/12/10/1619/html
Back to TopTop