Next Article in Journal
Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems
Previous Article in Journal
A Performance Analysis of You Only Look Once Models for Deployment on Constrained Computational Edge Devices in Drone Applications
 
 
Article

Article Versions Notes

Electronics 2025, 14(3), 640; https://doi.org/10.3390/electronics14030640
Action Date Notes Link
article pdf uploaded. 6 February 2025 15:50 CET Version of Record https://www.mdpi.com/2079-9292/14/3/640/pdf-vor
article xml file uploaded 10 February 2025 05:20 CET Original file -
article xml uploaded. 10 February 2025 05:20 CET Update -
article pdf uploaded. 10 February 2025 05:20 CET Updated version of record https://www.mdpi.com/2079-9292/14/3/640/pdf-vor
article html file updated 10 February 2025 05:22 CET Original file -
article xml file uploaded 10 February 2025 06:17 CET Update -
article xml uploaded. 10 February 2025 06:17 CET Update https://www.mdpi.com/2079-9292/14/3/640/xml
article pdf uploaded. 10 February 2025 06:17 CET Updated version of record https://www.mdpi.com/2079-9292/14/3/640/pdf
article html file updated 10 February 2025 06:18 CET Update https://www.mdpi.com/2079-9292/14/3/640/html
Back to TopTop