Next Article in Journal
A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers
Previous Article in Journal
Key Vulnerable Nodes Discovery Based on Bayesian Attack Subgraphs and Improved Fuzzy C-Means Clustering
Previous Article in Special Issue
Real-Time EtherCAT-Based Control Architecture for Electro-Hydraulic Humanoid
 
 
Article

Article Versions Notes

Mathematics 2024, 12(10), 1451; https://doi.org/10.3390/math12101451
Action Date Notes Link
article pdf uploaded. 8 May 2024 13:34 CEST Version of Record https://www.mdpi.com/2227-7390/12/10/1451/pdf-vor
article xml file uploaded 13 May 2024 10:06 CEST Original file -
article xml uploaded. 13 May 2024 10:06 CEST Update -
article pdf uploaded. 13 May 2024 10:06 CEST Updated version of record https://www.mdpi.com/2227-7390/12/10/1451/pdf-vor
article html file updated 13 May 2024 10:07 CEST Original file -
article xml file uploaded 13 May 2024 11:15 CEST Update -
article xml uploaded. 13 May 2024 11:15 CEST Update https://www.mdpi.com/2227-7390/12/10/1451/xml
article pdf uploaded. 13 May 2024 11:15 CEST Updated version of record https://www.mdpi.com/2227-7390/12/10/1451/pdf
article html file updated 13 May 2024 11:17 CEST Update https://www.mdpi.com/2227-7390/12/10/1451/html
Back to TopTop