Next Article in Journal
A Novel Modular Multiport Converter for Enhancing the Performance of Photovoltaic-Battery Based Power Systems
Next Article in Special Issue
Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
Previous Article in Journal
Value-Oriented Requirements: Eliciting Domain Requirements from Social Network Services to Evolve Software Product Lines
Previous Article in Special Issue
Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis
 
 
Article

Article Versions Notes

Appl. Sci. 2019, 9(19), 3945; https://doi.org/10.3390/app9193945
Action Date Notes Link
article xml file uploaded 20 September 2019 12:01 CEST Original file -
article xml uploaded. 20 September 2019 12:01 CEST Update -
article pdf uploaded. 20 September 2019 12:01 CEST Version of Record https://www.mdpi.com/2076-3417/9/19/3945/pdf-vor
article html file updated 20 September 2019 12:03 CEST Original file -
article xml file uploaded 22 September 2019 11:29 CEST Update -
article xml uploaded. 22 September 2019 11:29 CEST Update https://www.mdpi.com/2076-3417/9/19/3945/xml
article pdf uploaded. 22 September 2019 11:29 CEST Updated version of record https://www.mdpi.com/2076-3417/9/19/3945/pdf
article html file updated 22 September 2019 11:30 CEST Update -
article html file updated 15 October 2019 12:34 CEST Update -
article html file updated 13 February 2020 19:02 CET Update -
article html file updated 20 July 2022 03:03 CEST Update https://www.mdpi.com/2076-3417/9/19/3945/html
Back to TopTop