Next Article in Journal
Big Data Handling Approach for Unauthorized Cloud Computing Access
Previous Article in Journal
A Visual Cryptography-Based Watermarking Approach for the Detection and Localization of Image Forgery
 
 
Article

Article Versions Notes

Electronics 2022, 11(1), 135; https://doi.org/10.3390/electronics11010135
Action Date Notes Link
article xml file uploaded 2 January 2022 10:59 CET Original file -
article xml uploaded. 2 January 2022 10:59 CET Update https://www.mdpi.com/2079-9292/11/1/135/xml
article pdf uploaded. 2 January 2022 10:59 CET Version of Record https://www.mdpi.com/2079-9292/11/1/135/pdf
article html file updated 2 January 2022 11:00 CET Original file -
article html file updated 2 January 2022 11:00 CET Update -
article html file updated 31 July 2022 01:45 CEST Update https://www.mdpi.com/2079-9292/11/1/135/html
Back to TopTop