Next Article in Journal
Identification of Critical Road Links Based on Static and Dynamic Features Fusion
Next Article in Special Issue
Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
Previous Article in Journal
Cross-Domain Conv-TasNet Speech Enhancement Model with Two-Level Bi-Projection Fusion of Discrete Wavelet Transform
Previous Article in Special Issue
PDF Malware Detection Based on Fuzzy Unordered Rule Induction Algorithm (FURIA)
 
 
Article

Article Versions Notes

Appl. Sci. 2023, 13(10), 5993; https://doi.org/10.3390/app13105993
Action Date Notes Link
article xml file uploaded 13 May 2023 07:02 CEST Original file -
article xml uploaded. 13 May 2023 07:02 CEST Update -
article pdf uploaded. 13 May 2023 07:02 CEST Version of Record https://www.mdpi.com/2076-3417/13/10/5993/pdf-vor
article html file updated 13 May 2023 07:03 CEST Original file -
article xml file uploaded 13 May 2023 07:17 CEST Update -
article xml uploaded. 13 May 2023 07:17 CEST Update -
article pdf uploaded. 13 May 2023 07:17 CEST Updated version of record https://www.mdpi.com/2076-3417/13/10/5993/pdf-vor
article html file updated 13 May 2023 07:19 CEST Update -
article xml file uploaded 16 May 2023 07:02 CEST Update -
article xml uploaded. 16 May 2023 07:02 CEST Update https://www.mdpi.com/2076-3417/13/10/5993/xml
article pdf uploaded. 16 May 2023 07:02 CEST Updated version of record https://www.mdpi.com/2076-3417/13/10/5993/pdf
article html file updated 16 May 2023 07:03 CEST Update https://www.mdpi.com/2076-3417/13/10/5993/html
Back to TopTop