Next Article in Journal
Additive Orthant Loss for Deep Face Recognition
Next Article in Special Issue
Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications
Previous Article in Journal
Malware Detection Using Memory Analysis Data in Big Data Environment
 
 
Article

Article Versions Notes

Appl. Sci. 2022, 12(17), 8605; https://doi.org/10.3390/app12178605
Action Date Notes Link
article pdf uploaded. 27 August 2022 17:15 CEST Version of Record https://www.mdpi.com/2076-3417/12/17/8605/pdf-vor
article xml file uploaded 29 August 2022 10:33 CEST Original file -
article xml uploaded. 29 August 2022 10:33 CEST Update -
article pdf uploaded. 29 August 2022 10:33 CEST Updated version of record https://www.mdpi.com/2076-3417/12/17/8605/pdf-vor
article html file updated 29 August 2022 10:34 CEST Original file -
article xml file uploaded 29 August 2022 11:03 CEST Update -
article xml uploaded. 29 August 2022 11:03 CEST Update -
article pdf uploaded. 29 August 2022 11:03 CEST Updated version of record https://www.mdpi.com/2076-3417/12/17/8605/pdf-vor
article html file updated 29 August 2022 11:05 CEST Update -
article xml file uploaded 30 August 2022 07:19 CEST Update -
article xml uploaded. 30 August 2022 07:19 CEST Update https://www.mdpi.com/2076-3417/12/17/8605/xml
article pdf uploaded. 30 August 2022 07:19 CEST Updated version of record https://www.mdpi.com/2076-3417/12/17/8605/pdf
article html file updated 30 August 2022 07:21 CEST Update -
article html file updated 28 February 2023 11:08 CET Update https://www.mdpi.com/2076-3417/12/17/8605/html
Back to TopTop