Next Article in Journal
Advanced Network and System Security Teaching
Next Article in Special Issue
A Performance Analysis of You Only Look Once Models for Deployment on Constrained Computational Edge Devices in Drone Applications
Previous Article in Journal
RF Fingerprinting Using Transient-Based Identification Signals at Sampling Rates Close to the Nyquist Limit
Previous Article in Special Issue
A Hessian-Based Deep Learning Preprocessing Method for Coronary Angiography Image Analysis
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 24 December 2024 10:38 CET Original file -
article xml uploaded. 24 December 2024 10:38 CET Update https://www.mdpi.com/2079-9292/14/1/5/xml
article pdf uploaded. 24 December 2024 10:38 CET Version of Record https://www.mdpi.com/2079-9292/14/1/5/pdf
article html file updated 24 December 2024 10:41 CET Original file https://www.mdpi.com/2079-9292/14/1/5/html
Back to TopTop