Next Article in Journal
Bifurcation Analysis of a Class of Food Chain Model with Two Time Delays
Previous Article in Journal
The Exponential Versus the Complex Power ez Function Revisited
Previous Article in Special Issue
Zero-Trust Mechanisms for Securing Distributed Edge and Fog Computing in 6G Networks
 
 
Article

Article Versions Notes

Mathematics 2025, 13(8), 1308; https://doi.org/10.3390/math13081308
Action Date Notes Link
article pdf uploaded. 16 April 2025 15:42 CEST Version of Record https://www.mdpi.com/2227-7390/13/8/1308/pdf-vor
article xml file uploaded 17 April 2025 07:53 CEST Original file -
article xml uploaded. 17 April 2025 07:53 CEST Update https://www.mdpi.com/2227-7390/13/8/1308/xml
article pdf uploaded. 17 April 2025 07:53 CEST Updated version of record https://www.mdpi.com/2227-7390/13/8/1308/pdf
article html file updated 17 April 2025 07:56 CEST Original file https://www.mdpi.com/2227-7390/13/8/1308/html
Back to TopTop