Next Article in Journal
Development of Cybersecurity Technology and Algorithm Based on Quantum Computing
Previous Article in Journal
A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks
Previous Article in Special Issue
A Set Covering Model for a Green Ship Routing and Scheduling Problem with Berth Time-Window Constraints for Use in the Bulk Cargo Industry
 
 
Article

Article Versions Notes

Appl. Sci. 2021, 11(19), 9084; https://doi.org/10.3390/app11199084
Action Date Notes Link
article pdf uploaded. 29 September 2021 12:51 CEST Version of Record https://www.mdpi.com/2076-3417/11/19/9084/pdf-vor
article supplementary file uploaded. 29 September 2021 12:51 CEST - https://www.mdpi.com/2076-3417/11/19/9084#supplementary
article xml file uploaded 30 September 2021 09:50 CEST Original file -
article xml uploaded. 30 September 2021 09:50 CEST Update https://www.mdpi.com/2076-3417/11/19/9084/xml
article pdf uploaded. 30 September 2021 09:50 CEST Updated version of record https://www.mdpi.com/2076-3417/11/19/9084/pdf
article html file updated 30 September 2021 09:51 CEST Original file -
article html file updated 30 July 2022 08:24 CEST Update https://www.mdpi.com/2076-3417/11/19/9084/html
Back to TopTop