Next Article in Journal
ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files
Next Article in Special Issue
Internet of Things and Its Applications: A Comprehensive Survey
Previous Article in Journal
The Use of a Hidden Mixture Transition Distribution Model in Clustering Few but Long Continuous Sequences: An Illustration with Cognitive Skills Data
Previous Article in Special Issue
Truncated-Exponential-Based Appell-Type Changhee Polynomials
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Symmetry 2020, 12(10), 1619; https://doi.org/10.3390/sym12101619
Action Date Notes Link
article xml file uploaded 30 September 2020 11:48 CEST Original file -
article xml uploaded. 30 September 2020 11:48 CEST Update https://www.mdpi.com/2073-8994/12/10/1619/xml
article pdf uploaded. 30 September 2020 11:48 CEST Version of Record https://www.mdpi.com/2073-8994/12/10/1619/pdf
article html file updated 30 September 2020 11:50 CEST Original file -
article html file updated 22 July 2022 09:11 CEST Update https://www.mdpi.com/2073-8994/12/10/1619/html
Back to TopTop