Next Article in Journal
Realistic Data Delays and Alternative Inactivity Definitions in Telecom Churn: Investigating Concept Drift Using a Sliding-Window Approach
Next Article in Special Issue
Text Mining Approaches for Exploring Research Trends in the Security Applications of Generative Artificial Intelligence
Previous Article in Journal
Experimental Identification of Characteristic Curves of Supersonic Vacuum Ejector and Empirical Prediction of Total Evacuation Time
Previous Article in Special Issue
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
 
 
Article

Article Versions Notes

Appl. Sci. 2025, 15(3), 1600; https://doi.org/10.3390/app15031600
Action Date Notes Link
article xml file uploaded 5 February 2025 11:54 CET Original file -
article xml uploaded. 5 February 2025 11:54 CET Update -
article pdf uploaded. 5 February 2025 11:54 CET Version of Record -
article html file updated 5 February 2025 11:55 CET Original file -
article xml file uploaded 5 February 2025 12:21 CET Update -
article xml uploaded. 5 February 2025 12:21 CET Update https://www.mdpi.com/2076-3417/15/3/1600/xml
article pdf uploaded. 5 February 2025 12:21 CET Updated version of record https://www.mdpi.com/2076-3417/15/3/1600/pdf
article html file updated 5 February 2025 12:24 CET Update https://www.mdpi.com/2076-3417/15/3/1600/html
Back to TopTop