Next Article in Journal
Study on Damage Behavior and Its Energy Distribution of Deep Granite at High-Temperature Conditions
Next Article in Special Issue
Cluster-Based Approaches toward Developing a Customer Loyalty Program in a Private Security Company
Previous Article in Journal
Exploring Prior Knowledge from Human Mobility Patterns for POI Recommendation
Previous Article in Special Issue
A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing
 
 
Review

Article Versions Notes

Appl. Sci. 2023, 13(11), 6497; https://doi.org/10.3390/app13116497
Action Date Notes Link
article xml file uploaded 26 May 2023 08:48 CEST Original file -
article xml uploaded. 26 May 2023 08:48 CEST Update https://www.mdpi.com/2076-3417/13/11/6497/xml
article pdf uploaded. 26 May 2023 08:48 CEST Version of Record https://www.mdpi.com/2076-3417/13/11/6497/pdf
article html file updated 26 May 2023 08:50 CEST Original file -
article html file updated 26 May 2023 08:51 CEST Update -
article html file updated 26 May 2023 08:52 CEST Update https://www.mdpi.com/2076-3417/13/11/6497/html
Back to TopTop