Next Article in Journal
Performance Analysis of Feature Selection Methods in Software Defect Prediction: A Search Method Approach
Next Article in Special Issue
Semantic-Based Representation Binary Clone Detection for Cross-Architectures in the Internet of Things
Previous Article in Journal
Experimental Investigation on Chemical Grouting in a Permeated Fracture Replica with Different Roughness
Previous Article in Special Issue
Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
 
 
Review

Article Versions Notes

Appl. Sci. 2019, 9(13), 2763; https://doi.org/10.3390/app9132763
Action Date Notes Link
article xml file uploaded 9 July 2019 09:27 CEST Original file -
article xml uploaded. 9 July 2019 09:27 CEST Update https://www.mdpi.com/2076-3417/9/13/2763/xml
article pdf uploaded. 9 July 2019 09:27 CEST Version of Record https://www.mdpi.com/2076-3417/9/13/2763/pdf
article html file updated 9 July 2019 09:29 CEST Original file -
article html file updated 17 July 2019 17:33 CEST Update -
article html file updated 13 February 2020 01:04 CET Update -
article html file updated 20 July 2022 07:18 CEST Update https://www.mdpi.com/2076-3417/9/13/2763/html
Back to TopTop