Next Article in Journal
A Deep Q-Learning Based UAV Detouring Algorithm in a Constrained Wireless Sensor Network Environment
Previous Article in Journal
Detection of Ethereum Phishing Fraud Nodes Based on Feature Enhancement Strategy and GBM
 
 
Article

Article Versions Notes

Electronics 2024, 13(24), 5061; https://doi.org/10.3390/electronics13245061
Action Date Notes Link
article xml file uploaded 23 December 2024 16:27 CET Original file -
article xml uploaded. 23 December 2024 16:28 CET Update -
article pdf uploaded. 23 December 2024 16:28 CET Version of Record https://www.mdpi.com/2079-9292/13/24/5061/pdf-vor
article html file updated 23 December 2024 16:29 CET Original file -
article xml file uploaded 24 December 2024 08:00 CET Update -
article xml uploaded. 24 December 2024 08:00 CET Update -
article pdf uploaded. 24 December 2024 08:00 CET Updated version of record https://www.mdpi.com/2079-9292/13/24/5061/pdf-vor
article html file updated 24 December 2024 08:02 CET Update -
article xml file uploaded 24 December 2024 08:30 CET Update -
article xml uploaded. 24 December 2024 08:30 CET Update https://www.mdpi.com/2079-9292/13/24/5061/xml
article pdf uploaded. 24 December 2024 08:30 CET Updated version of record https://www.mdpi.com/2079-9292/13/24/5061/pdf
article html file updated 24 December 2024 08:31 CET Update https://www.mdpi.com/2079-9292/13/24/5061/html
Back to TopTop