Next Article in Journal
A Toxic Style Transfer Method Based on the Delete–Retrieve–Generate Framework Exploiting Toxic Lexicon Semantic Similarity
Previous Article in Journal
Leveraging Explainable Artificial Intelligence in Real-Time Cyberattack Identification: Intrusion Detection System Approach
 
 
Communication

Article Versions Notes

Appl. Sci. 2023, 13(15), 8589; https://doi.org/10.3390/app13158589
Action Date Notes Link
article xml file uploaded 26 July 2023 09:07 CEST Original file -
article xml uploaded. 26 July 2023 09:07 CEST Update -
article pdf uploaded. 26 July 2023 09:07 CEST Version of Record -
article html file updated 26 July 2023 09:56 CEST Original file -
article xml file uploaded 26 July 2023 12:04 CEST Update -
article xml uploaded. 26 July 2023 12:04 CEST Update https://www.mdpi.com/2076-3417/13/15/8589/xml
article pdf uploaded. 26 July 2023 12:04 CEST Updated version of record https://www.mdpi.com/2076-3417/13/15/8589/pdf
article html file updated 26 July 2023 12:05 CEST Update -
article html file updated 6 August 2023 22:05 CEST Update https://www.mdpi.com/2076-3417/13/15/8589/html
Back to TopTop