Next Article in Journal
A Robust and Anonymous Three-Factor Authentication Scheme Based ECC for Smart Home Environments
Next Article in Special Issue
Failure Evaluation of Electronic Products Based on Double Hierarchy Hesitant Fuzzy Linguistic Term Set and K-Means Clustering Algorithm
Previous Article in Journal
Co-Saliency Detection of RGBD Image Based on Superpixel and Hypergraph
Previous Article in Special Issue
Reliability Inferences of the Inverted NH Parameters via Generalized Type-II Progressive Hybrid Censoring with Applications
 
 
Article

Article Versions Notes

Symmetry 2022, 14(11), 2395; https://doi.org/10.3390/sym14112395
Action Date Notes Link
article pdf uploaded. 12 November 2022 09:48 CET Version of Record https://www.mdpi.com/2073-8994/14/11/2395/pdf-vor
article xml file uploaded 17 November 2022 11:11 CET Original file -
article xml uploaded. 17 November 2022 11:11 CET Update -
article pdf uploaded. 17 November 2022 11:11 CET Updated version of record https://www.mdpi.com/2073-8994/14/11/2395/pdf-vor
article html file updated 17 November 2022 11:13 CET Original file -
article xml file uploaded 24 November 2022 09:54 CET Update -
article xml uploaded. 24 November 2022 09:54 CET Update -
article pdf uploaded. 24 November 2022 09:54 CET Updated version of record https://www.mdpi.com/2073-8994/14/11/2395/pdf-vor
article html file updated 24 November 2022 09:56 CET Update -
article xml file uploaded 24 November 2022 11:35 CET Update -
article xml uploaded. 24 November 2022 11:35 CET Update https://www.mdpi.com/2073-8994/14/11/2395/xml
article pdf uploaded. 24 November 2022 11:35 CET Updated version of record https://www.mdpi.com/2073-8994/14/11/2395/pdf
article html file updated 24 November 2022 11:36 CET Update -
article html file updated 2 March 2023 22:53 CET Update https://www.mdpi.com/2073-8994/14/11/2395/html
Back to TopTop