Next Article in Journal
GLM-Based Fake Cybersecurity Threat Intelligence Detection Models and Algorithms
Previous Article in Journal
Detecting and Exploring Homogeneous Dense Groups via k-Core Decomposition and Core Member Filtering in Social Networks
Previous Article in Special Issue
Advancing Optimization Strategies in the Food Industry: From Traditional Approaches to Multi-Objective and Technology-Integrated Solutions
 
 
Article

Article Versions Notes

Appl. Sci. 2025, 15(19), 10754; https://doi.org/10.3390/app151910754
Action Date Notes Link
article xml file uploaded 6 October 2025 13:11 CEST Original file -
article xml uploaded. 6 October 2025 13:11 CEST Update https://www.mdpi.com/2076-3417/15/19/10754/xml
article pdf uploaded. 6 October 2025 13:11 CEST Version of Record https://www.mdpi.com/2076-3417/15/19/10754/pdf
article html file updated 6 October 2025 13:12 CEST Original file https://www.mdpi.com/2076-3417/15/19/10754/html
Back to TopTop