Next Article in Journal
Mouse Data Attack Technique Using Machine Learning in Image-Based User Authentication: Based on a Defense Technique Using the WM_INPUT Message
Next Article in Special Issue
Smartphone-Enabled Interaction on Large Displays—A Web-Technology-Based Approach
Previous Article in Journal
Enhancing Road Safety: Deep Learning-Based Intelligent Driver Drowsiness Detection for Advanced Driver-Assistance Systems
Previous Article in Special Issue
Advanced Examination of User Behavior Recognition via Log Dataset Analysis of Web Applications Using Data Mining Techniques
 
 
Article

Article Versions Notes

Electronics 2024, 13(4), 709; https://doi.org/10.3390/electronics13040709
Action Date Notes Link
article xml file uploaded 9 February 2024 12:30 CET Original file -
article xml uploaded. 9 February 2024 12:30 CET Update https://www.mdpi.com/2079-9292/13/4/709/xml
article pdf uploaded. 9 February 2024 12:30 CET Version of Record https://www.mdpi.com/2079-9292/13/4/709/pdf
article html file updated 9 February 2024 12:31 CET Original file https://www.mdpi.com/2079-9292/13/4/709/html
Back to TopTop