Next Article in Journal
Equivalent Circuit Modeling of a Dual-Gate Graphene FET
Next Article in Special Issue
A Hierarchical Approach for Android Malware Detection Using Authorization-Sensitive Features
Previous Article in Journal
F_Radish: Enhancing Silent Data Corruption Detection for Aerospace-Based Computing
Previous Article in Special Issue
Privacy-Preserving K-Nearest Neighbors Training over Blockchain-Based Encrypted Health Data
 
 
Article

Article Versions Notes

Electronics 2021, 10(1), 62; https://doi.org/10.3390/electronics10010062
Action Date Notes Link
article pdf uploaded. 31 December 2020 11:44 CET Version of Record https://www.mdpi.com/2079-9292/10/1/62/pdf-vor
article xml file uploaded 5 January 2021 02:17 CET Original file -
article xml uploaded. 5 January 2021 02:17 CET Update -
article pdf uploaded. 5 January 2021 02:17 CET Updated version of record https://www.mdpi.com/2079-9292/10/1/62/pdf-vor
article html file updated 5 January 2021 02:18 CET Original file -
article xml file uploaded 5 January 2021 12:25 CET Update -
article xml uploaded. 5 January 2021 12:25 CET Update https://www.mdpi.com/2079-9292/10/1/62/xml
article pdf uploaded. 5 January 2021 12:25 CET Updated version of record https://www.mdpi.com/2079-9292/10/1/62/pdf
article html file updated 5 January 2021 12:26 CET Update -
article html file updated 23 July 2022 09:07 CEST Update https://www.mdpi.com/2079-9292/10/1/62/html
Back to TopTop